Crypto phone

Crypto phone


Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance.

The interception of telecommunications has become a major industry. Most of the world's intelligence agencies and many private organisations intercept telephone communications to obtain military, economic and political information. The price of simple mobile phone surveillance devices has become so low that many individuals can afford to use them. [1][2] Advances in technology have made it difficult to determine who is intercepting and recording private communications.

Crypto phones can protect calls from interception by using algorithms to encrypt the signals. The phones have a cryptographic chip that handles encryption and decryption. Two algorithms are programmed into the chip: A key-exchange algorithm for the key agreement protocol and a symmetric-key algorithm for voice encryption.

Contents

Prevention

For the system to work, both users must have crypto phones logged into crypto mode. As with other phones, the signal is encripted by GSM but it is also encrypted by the cryptographic chip. When the IMSI-catcher performs a man-in-the-middle attack and disables the GSM encryption, the crypto phone encryption remains intact. Therefore, while the signal is still being intercepted, it can no longer be decoded and fake SMS messages can't be sent as the IMSI-catcher does not have the correct code.

Authentication

At the beginning of the call, both users get the same session key by using the hash function. Then the session key becomes a confirm code. The confirm code could be 3 letters or 4 numbers, depending on the phone's manufacturer. In the crypto mode, the user reads the confirm code over the encrypted line to his communication partner and verifies the confirm code his partner reads back. If there is a discrepancy in the confirm code, a man-in-the-middle attack has been detected.

Key Erase

The "session code" that has been established is used only for that specific call. At termination, all the parameters are wiped from memory, and there is no way to reconstruct the code. Intercepted and stored encrypted material can be kept for later analysis, but there is no way to break the code except, possibly, by the time consuming trial-and-error method.

See also

References

  1. ^ Hackers crack open mobile network BBC News Technology
  2. ^ Eavesdropping on GSM: state-of-affairs, Fabian van den Broek, Radboud University, Nijmegen, Institute for Computing and Information Sciences (iCIS).

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Crypto AG — Website http://www.crypto.ch/ Crypto AG is a Swiss company specialising in communications and information security. With headquarters in Steinhausen, the company is a long established manufacturer of encryption machines and a wide variety of… …   Wikipedia

  • Crypto API (Linux) — For the Microsoft Windows Cryptography API, see Cryptographic Application Programming Interface. Crypto API is a cryptography framework in the Linux kernel, for various parts of the kernel that deal with cryptography, such as IPsec and dm crypt.… …   Wikipedia

  • Goldvish — Infobox Company company type = unknown company name = GoldVish company foundation = flagicon|Switzerland 2003 [Per WHOIS data] location city = Amsterdam [Per WHOIS data and site] , Dubai, Geneva (Headquarters), and Moscow [Per site] . key people …   Wikipedia

  • Destroy All Humans! 2 — Make War Not Love Developer(s) Pandemic Studios Publisher(s) THQ …   Wikipedia

  • Destroy All Humans! — This article is about the videogame. For the series, see Destroy All Humans! (series). Destroy All Humans! North American cropped boxart …   Wikipedia

  • NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become …   Wikipedia

  • Text messaging — Texter redirects here. For the American surname, see Texter (surname). Txt msg redirects here. For the TV series, see Pop Up Video. A user typing a text message on an LG enV (VX9900) Text messaging, or texting, refers to the exchange of brief… …   Wikipedia

  • List of Destroy All Humans! characters — This is a list of characters appearing in the Destroy All Humans! series. Contents 1 Main series characters 1.1 Cryptosporidium 1.1.1 Crypto s clones 1.2 Orthopox 13 …   Wikipedia

  • Destroy All Humans! Path of the Furon — Developer(s) Sandblast Games Publisher …   Wikipedia

  • Destroy All Humans! (series) — Destroy All Humans! is a video game franchise developed by Pandemic Studios, Locomotive Games, Sandblast Games and published by THQ. The series is designed as a spoof of Cold War era alien invasion films. The first two games, Destroy All Humans!… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”