Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Secure telephone - Wikipedia
Secure telephone - Wikipedia
From Wikipedia, the free encyclopedia
Telephone that provides encrypted calls
A Secure Terminal Equipment desk set

A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack. Concerns about massive growth of telephone tapping incidents led to growing demand for secure telephones.

The practical availability of secure telephones is restricted by several factors; notably politics, export issues, incompatibility between different products (the devices on each side of the call have to use the same protocol), and high (though recently decreasing) price of the devices.

Well-known products

[edit]
Secure telephone of the Commandant colloquially known as Vertushka at the Constantine Palace, one of the residences of the President of Russian Federation

The best-known product on the US government market is the STU-III family. However, this system has now been replaced by the Secure Terminal Equipment (STE) and SCIP standards which defines specifications for the design of equipment to secure both data and voice. The SCIP standard was developed by the NSA and the US DOD to derive more interoperability between secure communication equipment. A new family of standard secure phones has been developed based on Philip Zimmermann's VoIP encryption standard ZRTP.[1]

VoIP and direct connection phones

[edit]

As the popularity of VoIP grows, secure telephony is becoming more widely used. Many major hardware and software providers offer it as a standard feature at no extra cost.

Examples include the Gizmo5 and Twinkle. Both of the former work with offerings from the founder of PGP, Phil Zimmermann, and his VoIP secure protocol, ZRTP. ZRTP is implemented in, amongst others, Ripcord Networks product SecurePC with up to NSA Suite B compliant Elliptic Curve math libraries. ZRTP is also being made available for mobile GSM CSD as a new standard for non-VoIP secure calls.

The U.S. National Security Agency is developing a secure phone based on Google's Android called Fishbowl.

Historically significant products

[edit]
SIGSALY exhibit at the National Cryptologic Museum

Scramblers were used to secure voice traffic during World War II (1939-1945), but were often intercepted and decoded due to scrambling's inherent insecurity. The first true secure telephone (operational from 1943) was SIGSALY, a massive device that weighed over 50 tons. The NSA, formed in 1952, developed a series of secure telephones, including the STU-I of the 1970s, STU-II and STU-III, as well as voice-encryption devices for military telephones.

In 1989 an Irish company called Intrepid developed one of the most advanced secure phones. Called "Milcode",[2] the phone was the first to implement code-excited linear prediction (or CELP) which dramatically improved voice quality and user-operability over previous LPC (Linear Predictive Coding) and LPC-10e versions.

Milcode also boasted significantly higher levels of security than previous secure telephones. The base model offered a proprietary encryption algorithm with a key-length of 512 bits, and a more advanced model with a key-length of 1024 bits. Key exchange used a public key, based on Diffie-Hellman, as opposed to a plug-in datakey. A new key was generated for each phone call. Milcode was also able to encrypt fax and data and was electromagnetically shielded to NATO TEMPEST standards.

Other products of historical significance are PGPfone and Nautilus (designed as a non-key escrow alternative to Clipper, now officially discontinued, but still available on SourceForge), SpeakFreely, and the security VoIP protocol wrapper Zfone (developed by Phil Zimmermann, who wrote the PGP software).

Scrambling, generally using a form of voice inversion, was available from suppliers of electronic hobbyist kits and is common on FRS radios. Analog scrambling is still used, as some telecommunications circuits, such as HF links and telephone lines in the developing world, are of very low quality.

See also

[edit]
  • telephone iconTelephones portal
  • Microphone blocker
  • Mobile phone tracking
  • Secure Real-time Transport Protocol (SRTP)
  • SCIP
  • TETRA
  • A5/1
  • ZRTP
  • Secure voice

References

[edit]
  1. ^ Aboraya, Ahmed; Nasrallah, Henry; Muvvala, Srinivas; El-Missiry, Ahmed; Mansour, Hader; Hill, Cheryl; Elswick, Daniel; Price, Elizabeth C. (May 2016). "The Standard for Clinicians' Interview in Psychiatry (SCIP): A Clinician-administered Tool with Categorical, Dimensional, and Numeric Output-Conceptual Development, Design, and Description of the SCIP". Innovations in Clinical Neuroscience. 13 (5–6): 31–77. ISSN 2158-8333. PMC 5077257. PMID 27800284.
  2. ^ Asian Defence Journal (1–4). Syed Hussain Publications Sdn. Bhd.: 176 1990 https://books.google.com/books?id=6s9r3akSsnYC. Retrieved 25 August 2024. MILCODE SECURE VOICE TERMINAL[:] An Irish company, specialising in secure communications has developed their own secure telephone [...] The company, Intrepid Ltd., brought together a team of some of the top specialists in this field in Europe, and [...] developed a secure voice terminal they called Milcode. {{cite journal}}: Missing or empty |title= (help)

External links

[edit]
  • Seminar on crypto phones by Zidu Wang Archived 2016-06-03 at the Wayback Machine
  • v
  • t
  • e
Cipher machines
Rotor machines
  • CCM
  • Enigma
  • M-125 Fialka
  • Hebern
  • HX-63
  • KL-7
  • Lacida
  • M-325
  • Mercury
  • NEMA
  • OMI
  • RED
  • SG-39
  • SG-41
  • SIGABA
  • SIGCUM
  • Singlet
  • Typex
Mechanical
  • Bazeries cylinder
  • C-36
  • C-52
  • CD-57
  • Cipher disk
  • HC-9
  • Kryha
  • Jefferson disk
  • M-94
  • M-209
  • Reihenschieber
  • Scytale
Teleprinter
  • 5-UCO
  • BID 770
  • DUDEK
  • KW-26
  • KW-37
  • Lorenz SZ 40/42
  • Siemens and Halske T52
  • SIGTOT
Secure voice
  • BID 150
  • FASCINATOR
  • KY-3
  • KY-58
  • KY-68
  • NESTOR
  • OMNI
  • SCIP
  • Sectéra Secure Module
  • SIGSALY
  • STE
  • STU-II
  • STU-III
  • VINSON
Other
  • JADE
  • KG-84
  • KL-43
  • KL-51
  • Noreen
  • Red
  • Purple
  • Pinwheel
  • Rockex
Computer hardware
  • AES instruction set
  • Intel SHA extensions
  • IBM 4758
  • IBM 4764
  • v
  • t
  • e
Cryptography
General
  • History of cryptography
  • Outline of cryptography
  • Classical cipher
  • Cryptographic protocol
    • Authentication protocol
  • Cryptographic primitive
  • Cryptanalysis
  • Cryptocurrency
  • Cryptosystem
  • Cryptographic nonce
  • Cryptovirology
  • Hash function
    • Cryptographic hash function
    • Key derivation function
    • Secure Hash Algorithms
  • Digital signature
  • Kleptography
  • Key (cryptography)
  • Key exchange
  • Key generator
  • Key schedule
  • Key stretching
  • Keygen
  • Machines
  • Ransomware
  • Random number generation
    • Cryptographically secure pseudorandom number generator (CSPRNG)
  • Pseudorandom noise (PRN)
  • Secure channel
  • Insecure channel
  • Subliminal channel
  • Encryption
  • Decryption
  • End-to-end encryption
  • Harvest now, decrypt later
  • Information-theoretic security
  • Plaintext
  • Codetext
  • Ciphertext
  • Shared secret
  • Trapdoor function
  • Trusted timestamping
  • Key-based routing
  • Onion routing
  • Garlic routing
  • Kademlia
  • Mix network
Mathematics
  • Cryptographic hash function
  • Block cipher
  • Stream cipher
  • Symmetric-key algorithm
  • Authenticated encryption
  • Public-key cryptography
  • Quantum key distribution
  • Quantum cryptography
  • Post-quantum cryptography
  • Message authentication code
  • Random numbers
  • Steganography
  • Category
icon
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Secure telephone" – news · newspapers · books · scholar · JSTOR
(May 2021) (Learn how and when to remove this message)
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Secure_telephone&oldid=1338930133"
Categories:
  • Secure telephones
  • Cryptographic hardware
Hidden categories:
  • CS1 errors: missing title
  • CS1 errors: bare URL
  • Articles with short description
  • Short description is different from Wikidata
  • Webarchive template wayback links
  • Articles needing additional references from May 2021
  • All articles needing additional references

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id