All I know is that L3-Communications ( Comm.Sys.-East Division ) was at least one company who built/used
Local Management Device/Key Processor ( LMD/KP )  combo ( LINUX Server ? ) .  

Another website of interest is the US Navy SPAWAR Info Assurance site in Charleston, South Carolina. 

Joe Tag

--- you wrote ---
Subject: Re: request for leaks: standards for secret (not published)
        true hardware random number generator requirements used by NSA
Message-ID:
        <CAJVRA1T755rypnamvrP17YiXDPQP9dd1jpn2QPCJFsHp_SGguw@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1

On Sun, Jan 19, 2014 at 8:49 PM, coderman <coderman@gmail.com> wrote:
> ... could this be true by tweaking constants and
> growing key bits?
> AES ~= MEDLEY
> ECDSA ~= SHILLELAGH
> ECDH ~= BATON
> SHA ~= SAVILLE
> ADH ~= WALBURN
> TRNG ~= JOSEKI-1


as linked, there are clues from PKCS interop which tell us about:

BATON: block cipher in use since at least 1995. 320-bit key and uses a
128-bit block in most modes, and also supports a 96-bit ECB mode. 160
bits of the key are checksum material. It supports a "shuffle" mode of
operation, like the NSA cipher JUNIPER. It may use up to 192 bits as
an initialization vector, regardless of the block size.

SAVILLE: used for voice? 128-bit key, two modes?


and per http://cryptome.org/poet-acm.htm
 some others?

ACCORDION
FIREFLY
KEESEE
MAYFLY
SHILLELAGH
WEASEL

(perhaps that last a stream cipher? ;)