TopSec Mobile Secure voice encryption for smartphones and laptops

Similar documents
TopSec Product Family Voice encryption at the highest security level

TopSec Mobile Tap-proof phone calls

R&S FSL Spectrum Analyzer Resolving Security Issues When Working in Secure Areas

R&S GNSS Test Automation Release Notes Software Version 1.3.2

BitLocker White Paper Windows 10

R&S RTC1002 Digital Oscilloscope Release Notes Firmware Version

Replacing R&S CMU200 with R&S CMW500 in 2G and 3G Speech Test Applications Application Note

LabVIEW driver history for the R&S HMC8012 Driver Documentation

R&S AVG Pattern Import Release Notes Firmware Version 02.25

R&S RTA4000 Digital Oscilloscope Release Notes Firmware Version

R&S ESU EMI Test Receiver. Release Notes. Firmware Version V5.74 SP1. Only an ESU with Windows 7 Operating System is supported

R&S MSD Modular System Device Flexible antenna switching and rotator control

R&S ELEKTRA EMC Test Software Swift and reliable measurement of electromagnetic disturbances

How to Apply MS17-10 to prevent WannaCrypt Attacks

How to Apply MS17-10 to prevent WannaCrypt Attacks

R&S QuickStep Test Executive Software Flexibility and excellent performance

R&S RECAL + Release Notes Software Version 4.01

R&S NRP-Z51/-Z52/-Z55/-Z56/- Z57/-Z58 Thermal Power Sensors Release Notes

R&S SGT100A RF Source Base Unit Release Notes FW Version

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s

R&S ESR EMI Test Receiver Release Notes Firmware Version V3.36 SP2

R&S CLIPSTER Mastering excellence.

R&S TSMAx Release Notes Firmware Version

R&S SMB100B Release Notes Firmware Version

R&S NGE100 Power Supply Series Reduced to the max

Simple Sequencing Tool for SCPI Commands Application Note

R&S VISA Release Notes Software Version 5.8.6

NQDI Classic Transform data into insights to support business decisions

R&S Spectrum Rider FPH Release Notes Firmware Version V1.40

R&S Broadcast Drive Test Release Notes Software Version 03.13

Voice Quality Measurements with R&S ROMES. Application Note

R&S TSMA Release Notes Firmware Version

R&S CMW Bluetooth Release Notes Software Version V3.2.70

R&S Spectrum Rider FPH Release Notes Firmware Version V1.50

Sending s without the risk! The Rohde & Schwarz Secure Web Interface

R&S ESW Test Receiver Release Notes Firmware Version V1.40 SP1

Resolving Security Issues When Working with the R&S ESIB in Secure Areas

.NET programming interface for R&S GTSL and R&S EGTSL

R&S ELEKTRA Release Notes Software Version V2.10

QualiPoc Android Probe Non-stop service quality monitoring and optimization

R&S Power Meter NRP Release Notes Firmware Version

How to deal with the effects of CVE

R&S SMA100B Release Notes Firmware Version

R&S Pulse Sequencer DFS Software Release Notes Software Version 1.6

R&S RTO and R&S RTE Oscilloscopes Release Notes Firmware Version

R&S CMW500 CDMA2000 1XRTT and 1xEV-DO Release Notes Software Version

R&S DSA DOCSIS Signal Analyzer Release Notes Firmware Version 2.2.1

R&S NRP-Z5 USB Sensor Hub Instrument Security Procedures

R&S AVBrun Sequencer Software. Release Notes. Firmware Version Release Notes. Broadcasting

R&S NRP-Z27/-Z37 Power Sensor Module Release Notes Firmware Version 04.18a

Brochure Version IP-based broadcast contribution and primary distribution revolution or evolution?

R&S Pulse Sequencer DFS Software Release Notes Software Version 1.7

Firmware Version Build 170 SP1

R&S DigIConf Software Release Notes Firmware Version Build 170 SP1

R&S NRPV Virtual Power Meter Release Notes Application Version 3.2

Complimentary Reference Material

IT security for energy infrastructures

R&S SpycerBox Ultra TL Spec Sheet

R&S RTB2000 Oscilloscope Release Notes Firmware Version

Firmware Release V1.83 SP3

R&S ZN-Z154 Calibration Unit Instrument Security Procedures

TSML-W Radio Network Analyzer

JABRA STYLE. User Manual. jabra.com/style

Sending s without the risk! Secure Communications with Rohde & Schwarz

R&S GP-U gateprotect Firewall How-to

R&S SMW200A Vector Signal Generator Instrument Security Procedures

IP Office Phones: Choices For Every Small Business

Security Statement. Revision Date: 4 January page 1/12

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Insights into the QoE of social media applications on smartphones a large-scale real field analysis White paper

BlackBerry UEM + Samsung Knox

Inmarsat BGAN High Data Rate Service. Service Launch Description

EMC Measurement Software EMC32

Cryptographic Systems

Front Surround System NEW PRODUCT BULLETIN

Cisco Jabber Video for ipad Frequently Asked Questions

R&S WinIQSIM2 Simulation Software Release Notes Firmware Version

R&S NRP USB and LAN Power Sensors Instrument Security Procedures

Odin. SMB Cloud InsightsTM GLOBAL

R&S NRP2 Power Meter Instrument Security Procedures

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

IP VPn COMMITTED TO QUALITY

R&S GP-U gateprotect Firewall How-to

Release Notes. R&S FSC Spectrum Analyzer

R&S SMB100A RF and Microwave Signal Generator Instrument Security Procedures

Multiline Client (MLC) for BYOD

OPENTOUCH SUITE FOR THE SMB

WLAN Handset 2212 Installation and Configuration for VPN

Cisco Desktop Collaboration Experience DX650 Security Overview

Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben

IP Office Phones: Choices For Every Small Business

Frequently Asked Questions

Grenzen der Kryptographie

Version 3.1. For the Odyssey Classic Infrared Imaging System

R&S SGS100A SGMA RF Source Instrument Security Procedures

NGN: Carriers and Vendors Must Take Security Seriously

The Future Outlook and Business Advantage of 3G Broadband and All-IP The Vision of Seamless Mobility

R&S SMBV100A Vector Signal Generator Instrument Security Procedures

Securing V2X communications with Infineon HSM

RELATIONSHIP WITH KONICA MINOLTA

Transcription:

Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops

TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide VoIP-based communications on smartphones and laptops. The TopSec Mobile securely encrypts voice communications end-to-end on IP-based communications networks and on BGAN and Thuraya satellite links. Users access these communications networks with the TopSec Mobile connected to smartphones and laptops via Bluetooth. The TopSec Mobile is easy and intuitive to operate using apps that are available for the most widely used operating systems. Because the TopSec Mobile is a smartphoneindependent encryption device, it cannot be manipulated by malware. Key facts Encryption device offering maximum security For flexible connection to smartphones and laptops via Bluetooth Intuitive operation thanks to easy-to-use apps Universal VoIP encryption via mobile radio, Internet and satellite connections 2

TopSec Mobile Benefits and key features Versatile Bluetooth interface for connection to smartphones and laptops USB cable connection to laptops app for smartphones and laptops Connection to IP networks via smartphones, laptops or satellite terminals Call setup over public or private VoIP servers page 4 TopSec encryption concept Method for maximum security Key agreement with elliptical curves, 384 bit Certificate-based authentication Voice encryption using the Advanced Encryption Standard (AES) 256-bit key page 6 Telephone as usual: For a secure call, simply hold the TopSec Mobile to your ear. Available models and software TopSec Mobile encryption device app for iphone app for Android smartphones R&S VoIP-SERVER S110 Rohde & Schwarz TopSec Mobile 3

Versatile Bluetooth interface for connection to smartphones and laptops The TopSec Mobile is a highly versatile voice encryption device in terms of its ability to connect to communications terminal equipment and networks. With its Bluetooth interface, it provides a dependable wireless connection to communications terminal equipment such as smartphones and laptops. Users can make confidential calls either directly with the TopSec Mobile or with a headset (included); the calls are encrypted and decrypted in the TopSec Mobile. The voice data sent from and to the TopSec Mobile is already secured to the highest possible level while it is transmitted via the Bluetooth interface. USB cable connection to laptops As an alternative to the wireless Bluetooth interface, the TopSec Mobile can be connected to a laptop via a USB cable. This enables users to set up an encrypted connection to an IP network in surroundings where a wireless connection is undesirable. The dialer interface for Internet telephony: The green call button sets up an encrypted call with the TopSec Mobile; the yellow call button is for unencrypted VoIP calls. The contact list. 4

app for smartphones and laptops The TopSec Mobile can be used with advanced smartphones and laptops. Users choose the numbers of the persons they want to call from a contact list on their smartphone or laptop. They do this with the app. can be used to make unencrypted VoIP calls directly with the smartphone as well as encrypted VoIP calls over the TopSec Mobile. Users accept encrypted VoIP calls directly on the TopSec Mobile. The encryption and decryption is carried out in the TopSec Mobile itself, without involving the smartphone or laptop. When making secure calls, users talk and listen through the TopSec Mobile's own microphone and speaker. This prevents possible manipulation by malware. also supports unencrypted VoIP. Users can access the full feature set available on their smartphone or laptop, and can simply choose secure calls when they wish. Connection to IP networks via smartphones, laptops or satellite terminals Users connect to IP networks via the communications terminal equipment. Smartphones provide wireless access to UMTS networks and WLANs. Laptops generally have a LAN port in addition to enable a wireline connection to IP networks. With the TopSec Mobile, users are also able to encrypt communications via BGAN and Thuraya IP satellite terminals. Call setup over public or private VoIP servers To place and receive VoIP calls, users must be registered on VoIP servers. The TopSec Mobile can set up encrypted connections using two common signaling protocols, SIP and IAX2. It works both with public SIP servers and with the R&S VoIP-SERVER S110. The R&S VoIP-SERVER S110 is especially suited to user groups with special security requirements who prefer to operate their own VoIP server. Voice encryption with the TopSec Mobile TopSec Mobile BGAN, Thuraya On the road Bluetooth Satellite terminal App Headset App TopSec Mobile Bluetooth App UMTS, EDGE, WLAN UMTS, EDGE, WLAN IP networks VoIP server Bluetooth, USB On the road App UMTS, EDGE, WLAN, cable Offroad Bluetooth, USB TopSec Mobile Office Rohde & Schwarz TopSec Mobile 5

TopSec encryption concept Method for maximum security Encryption in the TopSec Mobile is based on a hybrid process to achieve the highest level of security. This method requires that the partner encryption devices have the same mathematical parameters and that they use identical algorithms. Key agreement with elliptic curves, 384 bit The Diffie-Hellman key agreement protocol enables encrypted communications between two partner encryption devices without the need for central administrative services. This is referred to as an open system, because it is possible to establish a secure crypto connection with other TopSec Mobile encryption devices without the need for certificate-based authentication. The session key K calculated by the two partner encryption devices is used by the symmetric algorithms to encrypt or decrypt the digitized and compressed voice information. Certificate-based authentication Another measure to prevent man-in-the-middle attacks is to create closed user groups. This requires the TopSec Administrator, which combines the functions of a trust center with the centralized administration of operational parameters. During an initialization process, the TopSec devices receive a certificate and generate a public key pair that is used for authentication. In closed systems, authentication between the TopSec encryption devices takes place automatically. An encrypted connection is only established if authentication is successful. Consequently, calls made using the TopSec encryption devices meet the highest security requirements. Voice encryption using the Advanced Encryption Standard (AES) 256-bit key The TopSec Mobile and the partner encryption device automatically agree on a new 256-bit key during each call setup. A key is randomly selected from a pool of 10 76 possible keys and then deleted immediately upon completion of the call. This open system uses a four-digit security code to prevent man-in-the-middle attacks. A new code is calculated on both TopSec Mobile encryption devices for each encrypted call and is displayed on the TopSec Mobile's builtin screen. When the security codes are identical, a secure call is established. Combined key agreement and authentication Device A Assumption: common base point P 0, public keys P A, P B are included in the certificate, private keys S A, S B are only available in devices A and B Device B S A, P A = S A P 0 S B, P B = S B P 0 P B, Q B P A, Q A A selects a random value r A A calculates Q A = r A P 0 A calculates B selects a random value r B B calculates Q B = r B P 0 B calculates K = r A P B + (F(Q A, Q B ) r A + S A ) Q B K = r B P A + (F(Q B, Q A ) r B + S B ) Q A Neither r A, r B, S A nor S B were transmitted, only A and B have the random values r A or r B required for calculating the session key K 6

Specifications Specifications TopSec Mobile Bluetooth standard version 2.0 Standby time up to 100 h Talk time up to 4 h Dimensions 99 mm 34 mm 22 mm (3.9 in 1.3 in 0.9 in) Weight 58 g (0.13 lb) app for Android Android operating system version 2.3/4.0 app for iphone iphone operating system version 5/5.1 VoIP protocols SIP RFC3261 IAX2 RFC5456 Product overview Designation Voice Encryption Device App for Android App for iphone VoIP Server Administrator Software Type TopSec Mobile for Android for iphone R&S VoIP-SERVER S110 TopSec Admin The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Rohde & Schwarz is under license. Rohde & Schwarz TopSec Mobile 7

Service you can rely on J Worldwide J Local and personalized J Customized and flexible J Uncompromising quality J Long-term dependability About Rohde & Schwarz Rohde & Schwarz is an independent group of companies specializing in electronics. It is a leading supplier of solutions in the fields of test and measurement, broadcasting, radiomonitoring and radiolocation, as well as secure communications. Established more than 75 years ago, Rohde & Schwarz has a global presence and a dedicated service network in over 70 countries. Company headquarters are in Munich, Germany. Environmental commitment Energy-efficient products Continuous improvement in environmental sustainability Certified Quality System ISO 9001 Rohde & Schwarz SIT GmbH Am Studio 3 D-12489 Berlin Phone +49 30 65884-223 Fax +49 30 65884-184 E-mail: info.sit@rohde-schwarz.com www.sit.rohde-schwarz.com Rohde & Schwarz GmbH & Co. KG www.rohde-schwarz.com Regional contact Europe, Africa, Middle East +49 89 4129 12345 customersupport@rohde-schwarz.com North America 1 888 TEST RSA (1 888 837 87 72) customer.support@rsa.rohde-schwarz.com Latin America +1 410 910 79 88 customersupport.la@rohde-schwarz.com Asia/Pacific +65 65 13 04 88 customersupport.asia@rohde-schwarz.com China +86 800 810 8228/+86 400 650 5896 customersupport.china@rohde-schwarz.com R&S is a registered trademark of Rohde & Schwarz GmbH & Co. KG Trade names are trademarks of the owners Printed in Germany (ch) PD 3606.6492.12 Version 02.00 May 2012 TopSec Mobile Data without tolerance limits is not binding Subject to change 2012 Rohde & Schwarz GmbH & Co. KG 81671 München, Germany 3606649212