Secure telephone

Secure telephone

A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man in the middle attack.

How secure telephones work

The practical availability of secure telephones is restricted by several factors; notably politics, export issues, incompatibility between different products (the devices on each side of the call have to talk the same protocol), and high (though recently decreasing) price of the devices.

Well known products

The best-known product on the US government market is the STU-III family. However, this system has now been replaced by the Secure Terminal Equipment (STE) and SCIP standards which defines specifications for the design of equipment to secure both data and voice. The SCIP standard was developed by the NSA and the US DOD to derive more interoperability between secure communication equipment. A new family of standard secure phones has been created by Philip Zimmermann's based on the well recognized VoIP encryption standard ZRTP based on an open standard.

Privacy issues

The concerns about massive growth of telephone tapping incidents lead to growing demand for secure telephones. Several companies offer their products, eg. Swiss [http://www.khamsa.ch PrivateGSM] , Dutch CryptoPhone, Germany Secure Phone by securITus, Slovak Silentel SecureCall, SecureGSM, American Ripcord Networks, or the secure telephone division of Siemens AG .

VOIP vs direct connection phones

As the popularity of VoIP grows, secure telephony is becoming more of commonplace and less the lonely domain of spies and civil libertarians.

Many major hardware and software providers offer it as a standard feature. What used to only be available at high expense and to a limited number of people is now freely available.

Other examples include the Gizmo Project and Twinkle. Both of the former work with offerings from the founder of PGP, Phil Zimmermann, and his VoIP secure protocol, ZRTP. ZRTP is implemented in Ripcord Networks product SecurePC with up to NSA Suite B compliant Elliptic Curve math libraries.
ZRTP It's also being made available for mobile GSM CSD as a new standard for non-VoIP secure calls.

There are several manufacturers of hardware Analog Telephony Adapters such as Sipura/linksys and Snom which offer easy to use [http://voxilla.com/tools/device-configuration-wizard/certificate-authority-service-for-linksys-analog-voip-adaptors-808.html secure] options.

Historically significant products

Products of historical significance are PGPfone and Nautilus (designed as a non-backdoored alternative to Clipper), and now officially discontinued (but continuing living on SourceForge) "SpeakFreely", and the security VoIP protocol wrapper Zfone developed by the creator of PGP.

Other historical options involved scrambling generally using a form of voice inversion. This was available from electronic hobbyist kit suppliers and is common on FRS radios.

Analog scrambling products exist to this day because some telecommunications circuits, like HF links and telephone lines in the developing world -- are of very low quality.

See also

* Mobile phone tracking
* ZRTP

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di …   Wikipedia

  • Nautilus (secure telephone) — Nautilus is a program which allows two parties to securely communicate using modems or TCP/IP. It runs from a command line and is available for the Linux and Windows operating systems. The name was based upon Jules Verne s Nautilus and its… …   Wikipedia

  • Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means …   Wikipedia

  • Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… …   Wikipedia

  • Telephone Number Mapping — (ENUM or Enum, from E.164 NUmber Mapping) is a suite of protocols to unify the telephone numbering system E.164 with the Internet addressing system DNS by using an indirect lookup method, to obtain NAPTR records. The records are stored at a DNS… …   Wikipedia

  • Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… …   Wikipedia

  • Secure Communications Interoperability Protocol — SCIP is the U.S. Government s standard for secure voice and data communication. The acronym stands for Secure Communications Interoperability Protocol and was adopted to replace the FNBDT (Future Narrowband Digital Terminal) title in 2004. SCIP… …   Wikipedia

  • Secure Terminal Equipment — STE redirects here, for other meanings see STE (disambiguation). Secure Terminal Equipment (STE) is the U.S. Government s current (as of 2008), encrypted telephone communications system for wired or landline communications. STE is designed to use …   Wikipedia

  • Telephone card — A telephone card, calling card or phone card for short, is a small card, usually resembling a credit card, used to pay for telephone services. Such cards can either employ prepaid credit system or credit card style system of credit. The exact… …   Wikipedia

  • CONDOR secure cell phone — Qualcomm built several prototype secure CDMA phones for NSA under a contract project called Condor . They insisted on hardware encryption, originally using Fortezza PC cards, but later it became apparent that they really wanted STU III.STU III… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”