Secure telephony via classic and IP networks
office security solutions Every kind of telephone technology has its information risks...
Telephone conversations are still a all too easily forgotten. However, in- telephone technology and in increas- core function of daily communications formation security must be ensured ingly complex and inhomogeneous – where confidential information is at everywhere and at all times – regard- networks. Special attention should also risk and has to be protected against less of the technology being used. be paid to secure transitions in the im- third-party access. Or can you, in your Even though IP is becoming the base plementation of continuous networks. position of responsibility, afford to let technology for voice communication, Professionally implemented, such so- your telephone conversations be in- classic telephone networks (PSTN and lutions provide reliable protection tercepted by third parties? GSM) are still used in parallel. The against interception, are available ev- With the vast range of options of new challenge therefore lies in the smooth erywhere via fixed networks, GSM and communication technologies, the risks implementation of high-security en- Satcom, and can be operated without posed by voice communication are cryption solutions – for every kind of any specialist security knowledge.
Encryption solutions from Crypto AG for all networks and applications in the world of communication
2 Secure voice communication in the age of convergence
Encryption is a core competence As a full-service provider with exper- in your ICT infrastructure. which Crypto AG applies to the ever- tise in practically all common commu- Thanks to our service portfolio you increasing number of new technolo- nication technologies, we can imple- will receive a customised solution to gies. Network topologies are chang- ment your individual security solution help you benefit from all the tech- ing more rapidly than ever before, for combined use with fixed-network nological advantages and to provide and classic telephone networks are telephones, secure GSM telephones optimum support for your security converging with modern IP-based ICT and portable satellite telephony ter- policy. Our future-proof solutions will structures that offer operational and minals. support upgrades and further techno- structural benefits. For IP-based telephony you may use logical developments, thus ensuring We have the in-depth knowledge and our proven IP VPN security solutions that your investment is protected in experience to ensure the seamless in- as either a stationary or a portable sys- the long term. tegration of security technology into tem. Our IP encryption is multi-media the widest variety of communication capable and can therefore be used for networks. further applications (e.g. data, video)
Encrypted voice communications in modern IP networks
VoIP Phone 1 Phone1
VoIP Phone 2 Phone 2
VoIP IP PBX PBX Phone Headquarters
VoIP Traveller Phone IP VPN IP VPN PSTN Encryption Encryption Encryption Crypto Sat Mobile Client Terminal
SAT
IP/Internet
GSM VoIP IP VPN Phone Encryption Branch Office
PSTN Traveller
PSTN Phone GSM Encryption
3 Voice communication in military C2 applications
The duties of a defence organisation The systems have been designed with Security philosophy and architec- are manifold as are their requirements a pre-planned improvement capabili- ture for voice communication: here too, the ty to grow with new applications and The main elements of the comprehen- migration of technologies impacts the technologies, thus offering optimum sive security architecture from Crypto universally secure communication. In- protection of your investment and en- AG for all voice encryption solutions corporation into existing and new C2 suring that your organisation is well- are encryption in a tamper-proof hard- (Command & Control) structures is a prepared for future developments. ware encryption module based on sec- challenge for the future. Secure communication solutions from ret, user-specific algorithms, and safe Solutions from Crypto AG for military Crypto AG can be smoothly integrated security and key management in off- use in strategic networks can fulfil all into your existing networks and offer line or central online mode. the requirements of this environment end-to-end voice encryption for maxi- The flexible and secure management and are interoperable. mum security requirements. Connec- functions allow you to form and man- tions via leased lines/dedicated lines age individual cryptographic groups in are just as feasible as connections via any way you want – hierarchical, hori- PSTN, satellite or microwave. zontal or overlapping. In case of equip- ment loss, protection is ensured as individual units can be excluded from the network at any time.
4 ... but there is also a high-security encryption solution for each telephone technology
Security solutions from Crypto AG of- on your desktop, in the secretarial de- Convenient handling is provided by fer comprehensive protection from in- partment where they are operated, or the KHC-2000 Key Handling Centre, for terception for classic PSTN networks can be implemented to be shared by the central or decentralised manage- by means of end-to-end encryption. several users. ment of security data in the encryption units and for key changes. By forming Flexibility for use in your existing Interconnectivity between the fixed cryptographically protected groups telephone infrastructure is ensured, network and the GSM network is en- you can reproduce your organisation’s without the need for any change to sured by the compatibility of the pro- structure in the communication struc- your working practices. The technical ducts with PSTN encryption and the ture and make changes at any time. integration does not require any ad- secure GSM telephone. Theses sys- When working in online mode you justments to existing systems or equip- tems can also be used for applications can establish secure connections to ment. Encryption units can be placed via satellite connection. any single unit in the network without risk.
Secure voice end-to-end communications in PSTN and GSM networks and via satellite links
Phone 1 Phone 3
Phone Border Guard Phone 2
Headquarters PSTN Phone Encryption PBX Laptop VIP
PSTN PSTN Key Encryption Encryption Handling Centre
PSTN Encryption Branch Office PSTN
PBX SAT Traveller GSM Phone GSM Secretary
Phone VIP Sat PSTN Phone Terminal Encryption Sat PSTN Branch Office Phone Terminal Encryption
5 Crypto AG – To Remain Sovereign Crypto AG, Headquarters Crypto AG is your ideal partner for the effi- Crypto AG P.O. Box 460 cient and secure handling of information. CH-6301 Zug Switzerland As a legally and economically independent Tel. +41 41 749 77 22 Fax +41 41 741 22 72 Swiss company, we are not subject to any [email protected] www.crypto.ch export restrictions. Crypto AG, We have developed, manufactured and Regional Offices implemented custom security solutions for Abidjan Crypto AG over 55 years. The package we offer features 01 B.P. 5852 Abidjan 01 the latest technology solutions and com- Ivory Coast Tel. +225 22 41 17 71 prehensive services. Throughout the entire Fax +225 22 41 17 73
lifetime of your system, we provide you with Abu Dhabi Crypto AG – Abu Dhabi support services to guarantee autonomous P.O. Box 41076 Abu Dhabi operation and high availability whatever the United Arab Emirates user environment. Tel. +971 2 64 22 228 Fax +971 2 64 22 118 You too can rely on the expertise and capabil- Buenos Aires ities of Crypto AG – just like our customers in Crypto AG Maipu 1256 PB “A” over 130 countries. 1006 Buenos Aires Argentina Tel. +54 11 4312 1812 Fax +54 11 4312 1812
Kuala Lumpur Crypto AG www.crypto.ch Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights 50490 Kuala Lumpur Malaysia Tel. +60 3 2080 2150 Fax +60 3 2080 2140
Muscat Crypto AG Regional Office P.O. Box 2911 Seeb PC 111 Sultanate of Oman Tel. +968 2449 4966 Fax +968 2449 8929
A member of
The Crypto Group HC-2203 – EN/0830 ©2008 Crypto AG – CP Voice