KIR-1A/TSEC
The KIR-1A/TSEC system is the communications security (COMSEC) component of the MARK XII IFF system. Specifically, it provides the cryptographic security necessary for operating in Mode 4. It is not used to operate in Modes 1, 2, or 3/A. The TSEC/K1-1A system consists of the AKAK 3662 code key list (AKAK), the KIK-18A/T SEC code changer key (KIK), and the KIR-1A\TSEC interrogator computer (KIR).
 
 
kir1a.jpg
KIR-1A/TSEC encodes Mode 4 I.F.F. challenges for transmission by the interrogator. It also decodes the received Mode 4 transponder replies. The code changer key, TSEC/KIK-18, inserts the Mode 4 code into the computer. (Photo source - Navy Advancement page). 
Mode 4 I.F.F.operation is for military use only and allows for secure identification of friendly aircraft and surface vessels. IFF automatically generates a reply code according to a preset crypto key list. Mode 4 interrogations use encoded, multipulse trains with 4 (sync) pulses and an ISLS pulse, followed by up to 32 information pulses.   When the transponder receives and processes a valid Mode 4 interrogation, it sends out a time-coded, three-pulse reply. The interrogator converts the valid Mode 4 reply back to one pulse. The reply is then time decoded before it is presented on the indicator. There are no emergency replies for Mode 4 or Mode C.
 
The TSEC/K1-1A system consists of the AKAK 3662 code key list (AKAK), the KIK-18A/T SEC code changer key (KIK), and the KIR-1A\TSEC interrogator computer .  (Image via Global Security)
The AKAK 3662 is the operational code key list for the TSEC/K1-1A system. Editions are composed of 28 operational and two emergency tables providing code settings on a 28-day basis. The two emergency tables are not authorized for use. Individual tables consist of 64 metal pins in the KIK. Each table provides two key settings designated "A" + "B" (Day 1 and Day 2) so that aircraft which are airborne at key change time (2400Z) may shift to the next cryptovariable without rekeying their kit. Editions of the AKAK are classified CONFIDENTIAL and are marked CRYPTO. Individual tables are classified CONFIDENTIAL.

The KIK-18A/TSEC, code changer key is a mechanical device used to cryptographically key the KIR or KIT. The metal pins, which protrude from one end of the device, plug into the code changer assembly of the KIR or KIT to set the code. Once the pins are manually set, the KIK may be used to key any number of KIRs or KITs. The KIK is classified CONFIDENTIAL when set with a code and UNCLASSIFIED when not set. The KIR-1A\TSEC interrogator computer is used primarily in the ground/surface interrogator of MARK XII-equipped IFF systems. After being cryptographically keyed by the KIK, the KIR can compute individually unique interrogations that are transmitted as challenges through an interrogator to an unidentified aircraft. It also verifies the validity of the coded replies from the aircraft's transponder. The KIK is classified CONFIDENTIAL. Handling instructions are contained in TB 380-41 and NSA manual KAM 25

kir1a2.jpg
This circuit board was identified as belonging to the KIR-1A device. (E-bay photo)
As an example of a specific application, the KIR-1A is used  in the Stinger Identification Friend or Foe (IFF) subsystem,  part of the Stinger missile weapon system. The operator connects the IFF interrogator to the weapon by using the IFF interconnecting cable. When connected with the Stinger weapon round, the IFF interrogator is capable of transmitting a challenge (interrogation) to a potential target. If an improperly coded reply is received, the aircraft is classified as an "unknown" (possibly a foe).

One person who worked with the KIR-1A provides this additional input regarding the pins in the unit/.

"I worked on IFF systems back in the 1970s.  At one base, I was stationed, our shift had to key about 20 RF-4Cs (Phantoms)  every day before flight. The pins have a fairly strong spring, so when you're inserting the KIK, you can feel it push back. On successfully setting the code, you feel the tension from the springs go away. So it's easy to tell when it worked.   They had some sort of check going on, so if you had one pin set incorrectly, it would not take the code and would continually push back instead of accepting the bad code.

On the KIT itself, the door opens by pushing the silver button.  It would sometimes stick, so it wasn't always reliable. We had to set the thing blind by reaching up past some equipment. It was much easier to open the door by pushing down on the small latch that the button should have retracted.  When you do open the door, you hear a clunk from the code being dumped.   If you go to close the door and slip and it comes back open, (which was rare), you hear the clunk and have to re-key it.    We had one F4 that crashed into a mountain.  The IFF was somewhat secure, the black handle was torn off, and a slight crack in the case.  It should have dropped the code when power was gone, but it didn't.  When we were recording the serial number and getting ready to ship it off, opening the door caused the code to reset.  We were amazed it wasn't reset already. And if it didn't quite sink in.  the plane flew  into the side of a mountain. The KIT was up in the nose of the aircraft and should have been obliterated, but it pretty much survived".


SOURCES:

1) The Navy Advancement Web page.
http://www.advancement.cnet.navy.mil/products/web-pdf/tramans/bookchunks/et_v04ch3.pdf  (page unresponsive now)
2) Global Security http://www.globalsecurity.org/military/library/policy/army/fm/44-18/Ch2.htm#s1p3

Back To Menu Page

Jan 15/25