Cryptogic utilizes multiple identification and encryption methods that result in security levels that cannot be challenged now or in the foreseeable future.
Key benefits:
- Cryptogic is fully integrated with the mobile
phone device; the user can switch easily between either a secure or a regular call. - Two modes, urban HCSD(3G connection) and non-urban (2G connection) - facilitate the usability of the application and guarantee the right quality of the connection according to the zone.
- The possibility to make calls within 3G networks using the HSCSD, enables faster data transfer. This type of connection ensures the highest possible voice quality and minimal voice delay during encrypted calls.
- One-time pairing procedure provides comfort of use without any loss of safety. The possibility to use pre-paid cards supports the cost - effectiveness of the application.
- During encrypted calls, the application does not connect to any unsafe networks like the Internet.
Cryptoline Light Encryption Algorithms:
- Key Exchange Frequency - 30 sec
- Diffie-Hellman - 1024
- ARC4 - 1024
- DES - 128
- The operators network has to support CSD / HSCSD (Circuit Switched Data / High Speed Circuit Switched Data), and the call is realized on the same version of protocol.
Every day, millions of people who recognize the dangers of having
confidential information fall into the wrong hands, have the need to use
voice encryption software. Our Cryptogic voice encryption technology is
especially designed to encrypt your mobile phone calls on the fly,
protecting you from eavesdropping and call interceptions. The encryption
algorithms used by Cryptogic comply with AES (Advanced Encryption
Standards) and DES (Data Encryption Standard) authorized by the National
Security Agency for use by the US Government (CNSS Policy NO.15, Fact Sheet No.1):
"The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256)
are sufficient to protect classified information up to the SECRET level."
This entry was posted
on Saturday, October 17, 2009
and is filed under
S60V3 APPLICATIONS,
S60V5 APPLICATIONS
.
You can leave a response
and follow any responses to this entry through the
Subscribe to:
Post Comments (Atom)
.
0 comments