|
Main Cryptographic characteristics |
Encryption processor |
TMS 320 VC 5416 |
Crypto Phone call |
Yes |
Crypto SMS |
Yes |
Crypto E-mail |
Message body and attachments |
Encryption button |
Dedicated button |
Key power |
1077 |
Crypto algorithm |
Symmetric 256 bit |
Key distribution method |
Public key |
Data encryption in the phone |
Yes |
Syllable intelligibility |
87% |
- Tempest-proof special screens, filers and protection methods are used in Crypto Smartphone and protect reliably non-encrypted information from leakage into the air.
- A physical sensor of equiprobable keys – a user enters the selected keys into a Crypto Smartphone manually or automatically from a key sensor. Depending on the user requirement a Crypto Smartphone may have a separate portable or fixed key generator in a set to enter keys in the device.
- Two similar Crypto Smartphones should be used to provide the encrypted communication. Crypto Smartphones can function in the standard (public) and secure mode.
- Open key length 256 bit based on the elliptic curve.
- A public key is formed for each commutation session.
- A user can independently generate encryption keys and input them in the Crypto Smartphone.
- Compatibility with ISDN, PSTN Ancort phones.
- EDA (Encrypted Document Access) password protection.
|
|