Request for Information - Tactical Key Management Architecture based Encryptor

expired opportunity(Expired)
From: Federal Government(Federal)
FA830724RTKMA

Basic Details

started - 19 Mar, 2024 (1 month ago)

Start Date

19 Mar, 2024 (1 month ago)
due - 01 Apr, 2024 (25 days ago)

Due Date

01 Apr, 2024 (25 days ago)
Bid Notification

Type

Bid Notification
FA830724RTKMA

Identifier

FA830724RTKMA
DEPT OF DEFENSE

Customer / Agency

DEPT OF DEFENSE (708875)DEPT OF THE AIR FORCE (60448)AIR FORCE MATERIEL COMMAND (2222)AIR FORCE LIFE CYCLE MANAGEMENT CENTER (4864)
unlockUnlock the best of InstantMarkets.

Please Sign In to see more out of InstantMarkets such as history, intelligent business alerts and many more.

Don't have an account yet? Create a free account now.

(U) Request for Information (RFI) - Tactical Key Management Architecture based Encryptor(U) This Request for Information (RFI) is in accordance with the Federal Acquisition Regulation (FAR) clause 52.215-3 (Request for Information or Solicitation for Planning Purposes - Oct 1997) and is published to obtain information for use by the Air Force Lifecycle Management Center (AFLCMC), Cryptologic and Cyber Systems Division (HNC), Joint Base San Antonio – Lackland AFB, Texas, for market research and planning purposes only.(U) This RFI is NOT a Request for Proposal, Invitation for Bid, or an announcement of a solicitation; it is only intended for information or planning purposes. There is no bid package or solicitation document associated with this announcement. Response to this RFI is strictly voluntary and will not affect any potential offeror's ability to submit an offer if a solicitation is released. Any requests for a solicitation package will be disregarded. The government does not
intend to award a contract on the basis of this RFI or otherwise pay for the information solicited. No entitlement to payment of direct or indirect costs or charges by the government will arise as a result of preparing submissions in response to this RFI and the government's use of such information.(U) Submittals will not be returned to the sender. Respondents to this RFI may be requested to provide additional information/details based on their initial submittals.Program(U) This RFI is in support of programs within the Cryptologic Modernization Branch (AFLCMC/HNCA).Purpose(U) This RFI is NOT a Request for Proposal, Invitation for Bid, or an announcement of a solicitation; it is only intended to seek information from industry. The information provided may be used the program office to develop its acquisition strategy, statement of work and system requirements. Respondents to this RFI may be requested to provide additional information/details based on their initial submittals.Background (U) The Air Force Cryptologic Modernization Branch (AFLCMC/HNCA) is preparing for Cryptographic Modernization 2 (CM2) activities looking for novel ways to address the 6 capability groups and 42 associated gaps to achieve modernization of DoD cryptographic capabilities.(U) TKMA Background: Tactical Key Management Architecture was developed to support the needs of National Security Systems (NSS), sensors, and devices operating at the edge which may not have connection to an Enterprise IT infrastructure for access to key material. Tactical Key Management allows for mission-time key generation and secure delivery of high assurance keys to specific communities of interest (COIs), enabling high assurance encryption data at the edge. (U) MANET Radio Background: The Department of Defense (DoD) has recently shown increased interest in the use of commercial off-the-shelf (COTS) Mobile Ad Hoc Networks (MANETs) in tactical environments due to their ability to dynamically connect groups of mobile devices and enable communications without a fixed infrastructure. These COTS MANET Radios do not incorporate high assurance/NSA approved cryptography, overall limiting information sharing to/from operations centers.(U) This RFI will inform the potential development of a TKMA based encryptor capable of interoperating with COTS MANET Radios. The TKM based encryptor is envisioned to incorporate the following design characteristics:(U) Quantum Resilient: The TKM based encryptor shall incorporate Cryptographic Modernization 2 requirements, CNSA 2.0 algorithms, and be capable of performing software and firmware updates in the field.(U) Modular and Open: The TKM based encryptor shall include the functionality to interoperate with COTS MANET Radios and integrate using open, non-proprietary interfaces.(U) Standardized: The TKM based encryptor shall incorporate commercial standards and protocols that allows integrations with multiple vendor COTS MANET Radios. (U) Ruggedized: The TKM based encryptor shall meet environmental standards common to COTS MANET Radios that are employed in military operations (e.g., MIL-STD 810G, MIL-STD 461G)(U) Cost Effective: The TKM based encryptor shall be affordable to develop, deploy, maintain, and modernize.Information Sought(U) AFLCMC/HNCA requests industry provide information on a TKM based encryptor that can interoperate with COTS MANET Radios. Responses should answer the following questions: (U) Based on DoD use cases for COTS MANET Radios, what physical interfaces would you recommend incorporating in a TKM based encryptor?(U) Based on DoD use cases for COTS MANET Radios, what networking standards or protocols would you recommend incorporating in a TKM based encryptor?(U) Based on DoD use cases for COTS MANET Radios, what throughput requirements (e.g., 50 Mbps, 100 Mbps, etc.) should be considered for operational effectiveness and suitability.(U) Based on DoD use cases for COTS MANET Radios, what size, weight, power (SWaP) requirements should be considered for operational effectiveness and suitability.(U) Based on DoD use cases for COTS MANET Radios, would a control and status bypass capability be required?(U) To support the CNSA 2.0 Algorithm Suite, what type of non-person entity certificates and certificate authorities would be required (e.g., DoD PKI, etc.). (U) What risks are envisioned for the potential development and NSA certification of a TKM based encryptor?(U) Provide a cost and schedule rough order of magnitude (ROM) for the development phase of a TKM based encryptor. The ROM should incorporate costs associated with achieving NSA Certification.(U) Provide a ROM for the production of a TKM based encryptor. The ROM can assume that production will be in lot sizes of 1,000 increments.(U) Vendors who submit information for review do so with the understanding that U.S. Government personnel as well as their support contractors will review their material and data. Respondents will not be contacted regarding their submission or information gathered as a result of this notice nor the outcome of the Government's review of the solicited information unless the Government desires further information. Submitted information packages will be retained by the Government and not returned to the contractor. Ensure information is marked and sent appropriately if the response is Controlled Unclassified Information (CUI).(U) All interested, capable and responsible sources that wish to respond to this RFI are required to electronically supply their responses and send to org account: aflcmc.cryptologic.transformation@us.af.mil by COB 1 April 2024. Please include the title, “Tactical Key Management Architecture based Encryptor,” in the Subject Line.(U) NOTE: Additional follow-up questions may need to be accomplished over a secure form of communications.

United StatesLocation

Place Of Performance : United States

Country : United States

You may also like