Search for entries by keyword. Click an entry to view details, non-technical descriptions and images pertaining to the entry.

CATEGORY 5 - TELECOMMUNICATIONS AND 'INFORMATION SECURITY'

Part 2 - "INFORMATION SECURITY"

CATEGORY 5 - TELECOMMUNICATIONS AND 'INFORMATION SECURITY'

Part 2 - "INFORMATION SECURITY"

5A Systems, Equipment and Components

5A002 "Information security" systems, equipment and components, as follows:

a. Systems equipment and components for cryptographic "information security", as follows,

1. Designed or modified to use "cryptography" employing digital techniques performing any cryptographic function other than authentication, digital signature or the execution of copy-protected "software", and having any of the following:

a. A "symmetric algorithm" employing a key length in excess of 56 bits; or

b. An "asymmetric algorithm" where the security of the algorithm is based on any of the following:

1. Factorisation of integers in excess of 512 bits (e.g., RSA);

2. Computation of discrete logarithms in a multiplicative group of a finite field of size greater than 512 bits (e.g., Diffie-Hellman over Z/pZ); or

3. Discrete logarithms in a group other than mentioned in 5A002.a.1.b.2. in excess of 112 bits (e.g., Diffie-Hellman over an elliptic curve);

b. Designed or modified to enable, by means of "cryptographic activation" an item to achieve or exceed the controlled performance levels for functionality specified in 5A002.a. that would not otherwise be enabled.

c. Designed or modified to use or perform "quantum cryptography";

d. Designed or modified to use cryptographic techniques to generate channelising codes, scrambling codes or network identification codes, for systems using ultra-wideband modulation techniques and having any of the following:

e. Designed or modified to use cryptographic techniques to generate the spreading code for "spread spectrum" systems, other than those specified in 5A002.d., including the hopping code for "frequency hopping" systems.

5A003 Systems, equipment and components, for non-cryptographic "information security", as follows:

a. Communications cable systems designed or modified using mechanical, electrical or electronic means to detect surreptitious intrusion;

b. Specially designed or modified to reduce the compromising emanations of information-bearing signals beyond what is necessary for health, safety or electromagnetic interference standards;

5A004 Systems, equipment and components for defeating, weakening or bypassing "information security", as follows:

a. Designed or modified to perform 'cryptanalytic functions';

5B Test, Inspection and Production Equipment

5B002 "Information security" test, inspection and "production" equipment, as follows:

a. Equipment specially designed for the "development" or "production" of equipment specified in 5A002, 5A003, 5A004 or 5B002.b.;

b. Measuring equipment specially designed to evaluate and validate the "information security" functions of the equipment specified in 5A002 or "software" specified in 5D002.a. or 5D002.c.

5C Materials

5D Software

5D002 "Software" as follows:

a. "Software" specially designed or modified for the "development", "production" or "use" of equipment specified in 5A002, 5A003 or 5A004, or of "software" specified in 5D002.c.;

b. "Software" specially designed or modified to support "technology" specified in 5E002;

c. Specific "software", as follows:

1. "Software" having the characteristics of, or performing or simulating the functions of, equipment, specified in 5A002, 5A003 or 5A004;

2. "Software" to certify "software" specified in 5D002.c.1.

d. "Software" designed or modified to enable, by means of "cryptographic activation", an item to meet the criteria for functionality specified by 5A002.a., that would not otherwise be met.

General Notes

No information to display.

Definition of Terms

No information to display.

Images

No images to display.

Reasons for Control

No information to display.

CN Codes

No information to display.