Group key system with central management
Concept Group membership is established via a 256-bit group key. This is a symmetric key that is identical for every device belonging to the group. The session key for secure communication is derived from both the group key and the result of the CryptoPhone’s Diffie-Hellman key exchange operation. Thus, it is as secure as the plain Diffie-Hellman key exchange, but in addition, knowledge of the group key is required to derive the session key, effectively enforcing In Cryptophone devices belonging to multiple groups, automatic selection of matching call groups is offered based on a group key system with multiple hierarchies. Implementation |
An organization that deploys a TMP CryptoPhone CUG system has full autonomus control of the group keys. To prevent the group key material on the mobile devices from falling in the wrong hands when a device gets lost, stolen, or captured, secure storage is implemented on all devices using group key material. Trustworthy Voice Encryption TMP CryptoPhone technology is based on well-researched algorithms for both encryption and voice processing. It features the strongest encryption available combined with key lengths that provide peace of mind today and in the future. TMP CryptoPhones do not simply
|
The secure “key vault” in each phone stores the group key material for all groups of which that particular phone is a member. The secure storage section is encrypted using 256-bit AES256 and Twofish encryption in counter mode just as used for encrypted calls. Secure storage locks automatically if the phone is not to be used for some time, and then needs to be unlocked by the user with a device-specific pass phrase, such that a potential attacker will not be able to obtain group key material from a phone with locked secure storage. Key Management Console |
Deliverables Mobile Devices
Key Management Console
Optional Accessories
|