The Center for High Assurance Computer Systems has developed and fielded many Information Assurance products and solutions that meet the unique requirements of the Navy and Department of Defense. Highlighted below are just a few notable accomplishments in some of our focus technology areas.


Wireless Technology

Flying Squirrel Wireless Discovery & Mapping Applications

Developed as a Government-off-the-Shelf software application, this wireless technology solution provides real-time discovery, analysis, and mapping of IEEE 802.11a/b/g/n wireless networks. It has been selected as the standard wireless security tool by the Department of Defense (DoD) Enterprise-Wide Information Assurance and Computer Network Defense Enterprise-wide Solutions Steering Group (ESSG) for the purpose of detecting and thus deterring unauthorized wireless activity.


Cross Domain/Guarding

Network Pump®

Network Pump Diagram
Network Pump diagram

Developed as an affordable GOTS High Assurance "One-Way" Guard solution, its patented custom hardware security architecture enables applications operating on a lower security level network to pass information to applications on a higher security level network automatically, with high assurance that the information is delivered successfully, and without leakage of information from the High network to the Low network. It is currently being used operationally in systems by numerous customers.

For more information, see our brochure.


Cryptographic Technology

PEIP II Cryptographic Engine

PEIP II
PEIP II

In support of the NSA Crypto Modernization Program, designed and developed a GOTS NSA certified Type 1 programmable crypto engine that supports a wide array of functions. To lessen the required COMSEC functionality on the host system, the PEIP-II includes as many cryptographic and key management functions as possible. This includes key and Suite A & B crypto application storage, support for key decryption, and relevant public key exchange algorithms and protocols implemented to support infrastructure to End Crypto Unit (ECU) as well as ECU-to-ECU messaging. The programs using PEIP-II as a core cryptographic technology are: KG-3x Modernization Program (Increment 1 & 2), Ground Element MEECN System (GEMS), Modular Integrated Link Electronics System (MILES), Minuteman Silo Upgrade, and in FSBS.

For more information, see our brochure.


Anonymous Communications

The Onion Routing (TOR)

To aid in preventing unwanted network traffic analysis on DoD communications, developed the TOR application network that provides private, untraceable connections through a public network. Its single infrastructure and protocol supports anonymous traffic analysis resistant activities such as: multilevel secure communications over one network; intelligence gathering from open source; and communications using networks partially controlled by temporary allies/known hostiles. TOR was named by PC World as one of the 100 best products of 2005 and is the largest deployed and used network of its kind in existence (over 100,000 users and 250 network servers worldwide).

TOR diagram
TOR diagram

Software Assurance

Software Cost Reduction (SCR) Toolset

Developed a powerful, easy-to-use suite of tools to support the development of software where no formal expertise is required. Based on a scalable tabular notation for representing requirements, the SCR Toolset can assist in creating a specification, checking specifications for consistency, validating a specification, and verifying that a specification satisfies critical properties, such as safety and security properties. The suite includes a graphical interface for simulating applications, which aids in evaluation by actual system users, e.g., pilots or system operators. The SCR Toolset features provide several advantages that include:

  • Automatically finding inconsistencies in software specifications
  • Capable of producing a rapid prototype of a system
  • Saving time and cost by identifying errors early in the software development process
  • Ease of use, thus no formal expertise is required

Concealed Knowledge

Phasemark™ Digital Watermarking System

Designed and developed a patented method of watermarking digital images for authenticity. Using a signature extracted from the original image, it hides an encoded version of the signature back into the original image, forming the watermarked image. Specifically, Phasemark™ is a new transform domain digital watermarking technique that hides a signature obtained from the Fourier phases into the magnitude spectrum of the same host image. The detection process computes the discrete Fourier transform of the watermarked image, extracts and decodes the embedded signature, and then correlates it with calculated phase information. Correlation metrics determine the degree of authenticity of the image.


Network Security

Multilevel Web System (MLWeb)

Developed a system that is meant to securely extend an integrated set of web content and web applications to users that operate on networks in disparate security domains. Normally, such services would be provided separately from within each network enclave (set of information systems that reside in a single security domain), and any information to be shared among the enclaves would have to be moved by external means. MLWeb is comprised of multiple subsystems (hardware/software) that perform aspects of system security (authentication, content checker, etc.) to enforce all mandatory and some discretionary security policies for cross domain data transfers.