La description
Totally Secure Voice
Encryption
Built & Designed in close cooperation
withT-Systems/T-TeleSec,
the security division of Deutsche Telekom in Germany. Enigma
T**1TR provides strong end-to-end encryption for voice
communication on the standard GSM networks using the raw
data-service capabilities of the GSM network and state-of-the-art
cryptographic technology.
We are a well established mobile phone manufacturer. The hardware
and software components of the Tripleton Enigma have been built
to meet the most stringent government and military security
requirements.
Enigma T**1TR can operate as a secure crypto phone or as a normal
GSM mobile. In secure mode, it is possible to communicate with
other  Enigma T**1TR  devices.
Stylish, easy to use and despite being one of the lightest models
on the market, Enigma T**1TR Â is ideal for everyday business
use.
The GSM
Networks
The GSM system is a superb communication system all over the
world. But It does have well-publicised weaknesses that make it
inappropriate for exchanging confidential or sensitive
information.
Conventional GSM calls can be monitored or infiltrated by readily
available surveillance equipment. End-to-end security is not
provided, nor is it possible to authenticate the individual with
which you are in contact. Middle Man Attack from false base
stations are a real threat, as is the cloning of SIM cards.
At the IEEE "Secure Mobile Communications Conference" in Sept
***5, it was announced that the cost of the equipment required to
simulate a base station and intercept a conversation while
relaying it to the intended party had dropped to under £***0. It
is much cheaper today. Consequently, this ability is no longer
confined to the budgets of governments and large organisations -
Almost anyone could be listening.
Totally SecureCrypto PhoneComunications
Superb Speech
Quality
Enigma T**1Tr crypto phone
eliminates these problems. The encryption system, designed by Koç
Sistem and the system is designed to rigorous ITSEC
standards.
In addition, the phones all-important second SmartCard is totally
tamper-proof, and the keys are guaranteed by our Certification
Authority to be unique and secret.
Simple To
Use
To make a secure call with Enigma
T**1TR, all you have to do is dial the number and press
the"Crypto"
. And since you can only make
secure encrypted calls to other Enigma T**1TR devices the system
is totally secure.
Enigma T**1TR will work on all GSM ***0/**0 mobile communication
networks. It has the hallmarks of a business mobile phone. When
these are combined with an integrated encryption system it
becomes the superior business tool.
Â
Enigma T**1TR is as happy making normal calls as it is secure
calls.
Enigma T**1TR is not tied to any specific network, it uses your
existing mobile telephone number for both normal and secure
calls.
There is no need to purchase or install any server and there
is no need to make changes to the network . The only think you
should do is to get activeted your fax-data line from your GSM
operator.
Secure calls cost exactly the same as normal data calls, while
connection times require only an extra 7 seconds for
initialisation of the encryption algorithms.
From the network perspective, a crypto call would be seen as a
normal data/fax call.
Pioneering
technology
Enigma T**1TR’ s technology is
based around two internal SmartCards. The "GSM SIM", delivers
standard GSM services. The other, issued by a globally recognised
Trust Centre, delivers powerful authentication and encryption
using established and open protocols. This is known as the
Crypto-SIM or Netkey card.
Pioneering design merges these two technologies to create a
unique, unbreakable cypher key for each and every call -
providing failsafe point-to-point authentication and unbreachable
privacy.
The crypto-system employed is a hybrid mechanism, which is a
widely accepted and implemented in many high-end security
products. The Tripleton Enigma achieves full bi-directional
authentication with the secret keys held securely in, and never
leaving, the safe environment of the Netkey/TCOS card.
Connectivity to existing
landline infrastructures
Totally Secure Voice
Encryption
Security Features
· Secure voice communication (Crypto phone
calls)
· Can also operate as a standard GSM phone (Clear
calls, SMS etc)
· High performance crypto processor
· State-of-the-art audio codec for crypto phone
calls (excellent speech quality)
· Integrated Crypto Smart Card Reader (2nd
SIM)
· Crypto-Module Operating System: TCOS certified to
ITSEC E4+
· Multi award winning Crypto-SIM certified to ITSEC
E4+
· True Random Number Generator implemented in
Hardware
· Asymmetric/Public Key algorithm: RSA
· Symmetric algorithm: AES (**6 bit)
· Sim Lock
· Call logging and Caller-ID deactivation
· Exclusive communication groups using White
List
· Specific exclusion using Black lists (eg
Stolen/Lost handsets)
· Closed/Corporate User Group capability
· No back doors or escrow keys of any kind
· Entire system can be fully verified by customer
or other independent body
· Ease of use lends itself to all types of
users
· Inconspicuous design
· Can operate with any existing GSM SIM (can keep
your current phone number)
Additional Security Tools and
Services
· Crypto Management software and tools
· Certificate creation and management tools
(Customer-CA)
· Cryptanalysis and verification tools and
services.
Pays: |
Turkey |
N ° de modèle: |
2
|
Prix FOB: |
(Negotiable)
Obtenir le dernier prix
|
Localité: |
- |
Prix de commande minimale: |
- |
Commande minimale: |
1 Piece |
Packaging Detail: |
- |
Heure de livraison: |
- |
Capacité de Fournir: |
- |
Payment Type: |
T/T, L/C, D/A, D/P, Western Union, Money Gram, PayPal, Other |
Groupe de produits : |
- |