Abstract:
A system and method for repurposing of cryptographic capabilities in an electronic warfare (EW) environment is presented. A method begins by determining in a client system a cryptographic function to be performed; however, the client system does not have any cryptographic functionality. The client system then requests the cryptographic function be performed in a cryptographic logic that is physically secured with the client system and is external to the client system. The cryptographic logic performs the cryptographic function to produce a cryptographic result. The cryptographic result is then provided to the client system.