Monday, August 3, 2009

Secure GSM Mobile Phone

Secure GSM Phone has been designed to provide end-to-end secure communication across the GSM network. Secure GSM Phone is software application which can work with any mobile having Symbian 60.2 and 60.3 operating system. Secure GSM Phone uses AES 256 bit symmetric data protection algorithm encryption algorithm, which is currently the highest security standard worldwide.
Secure GSM Phone provides complete end to end protection, from phone to phone, for both audio and text messages. crypto GSM secure Phone is designed for easy operation and no security knowledge required by user. GSM Phone encrypts the Information and sent it automatically without any need for user interaction.
Secure GSM Mobile Phone Features and Specifications :-
  • Enables the encryption of the voice communication through the mobile phone in the GSM network.
  • AES algorithm with a 256-bit key for voice encryption.
  • Alternatively proprietary algorithm or other user defined encryption algorithm.
  • One-time encryption keys - there are always new keys created with every new phone call.
  • The key used with the current phone call will automatically be destroyed after the completion of the communication.
  • The Diffie-Hellman algorithm provides an exchange of the one-time keys.
  • The RSA algorithm authenticates the phone call.
  • It Can be used in any GSM network 900/1800/1900 MHz which supports the data call (CSD)
  • Supports roaming - the call encryption works also abroad depending on the operator.
  • The voice quality is the same as with the regular phone call - AMR voice compression.
  • The contact list is stored in an encrypted form in the mobile phone.
  • You can choose a mobile phone from the list of Symbian compatible mobile phones.
  • All mobile phone functions are accessible without any restrictions.
  • User communicates via headset (any standard).
  • Connection with the mobile phone is via Bluetooth.
  • Bluetooth connection is additionally encrypted with AES 256 (over original Bluetooth encryption).
  • Authentication.
  • The key management.
  • Crypto processor for the key generation.
  • Secure smart card for storing of the private keys and for crypto operations (FIPS 140-1 Level 2).

No comments:

Post a Comment