Secure telephony via classic and IP networks

office security solutions Every kind of telephone technology has its information risks...

Telephone conversations are still a all too easily forgotten. However, in- telephone technology and in increas- core function of daily communications formation security must be ensured ingly complex and inhomogeneous – where confidential information is at everywhere and at all times – regard- networks. Special attention should also risk and has to be protected against less of the technology being used. be paid to secure transitions in the im- third-party access. Or can you, in your Even though IP is becoming the base plementation of continuous networks. position of responsibility, afford to let technology for voice communication, Professionally implemented, such so- your telephone conversations be in- classic telephone networks (PSTN and lutions provide reliable protection tercepted by third parties? GSM) are still used in parallel. The against interception, are available ev- With the vast range of options of new challenge therefore lies in the smooth erywhere via fixed networks, GSM and communication technologies, the risks implementation of high-security en- Satcom, and can be operated without posed by voice communication are cryption solutions – for every kind of any specialist security knowledge.

Encryption solutions from Crypto AG for all networks and applications in the world of communication

2 Secure voice communication in the age of convergence

Encryption is a core competence As a full-service provider with exper- in your ICT infrastructure. which Crypto AG applies to the ever- tise in practically all common commu- Thanks to our service portfolio you increasing number of new technolo- nication technologies, we can imple- will receive a customised solution to gies. Network topologies are chang- ment your individual security solution help you benefit from all the tech- ing more rapidly than ever before, for combined use with fixed-network nological advantages and to provide and classic telephone networks are telephones, secure GSM telephones optimum support for your security converging with modern IP-based ICT and portable satellite telephony ter- policy. Our future-proof solutions will structures that offer operational and minals. support upgrades and further techno- structural benefits. For IP-based telephony you may use logical developments, thus ensuring We have the in-depth knowledge and our proven IP VPN security solutions that your investment is protected in experience to ensure the seamless in- as either a stationary or a portable sys- the long term. tegration of security technology into tem. Our IP encryption is multi-media the widest variety of communication capable and can therefore be used for networks. further applications (e.g. data, video)

Encrypted voice communications in modern IP networks

VoIP Phone 1 Phone1

VoIP Phone 2 Phone 2

VoIP IP PBX PBX Phone Headquarters

VoIP Traveller Phone IP VPN IP VPN PSTN Encryption Encryption Encryption Crypto Sat Mobile Client Terminal

SAT

IP/Internet

GSM VoIP IP VPN Phone Encryption Branch Office

PSTN Traveller

PSTN Phone GSM Encryption

3 Voice communication in military C2 applications

The duties of a defence organisation The systems have been designed with Security philosophy and architec- are manifold as are their requirements a pre-planned improvement capabili- ture for voice communication: here too, the ty to grow with new applications and The main elements of the comprehen- migration of technologies impacts the technologies, thus offering optimum sive security architecture from Crypto universally secure communication. In- protection of your investment and en- AG for all voice encryption solutions corporation into existing and new C2 suring that your organisation is well- are encryption in a tamper-proof hard- (Command & Control) structures is a prepared for future developments. ware encryption module based on sec- challenge for the future. Secure communication solutions from ret, user-specific algorithms, and safe Solutions from Crypto AG for military Crypto AG can be smoothly integrated security and key management in off- use in strategic networks can fulfil all into your existing networks and offer line or central online mode. the requirements of this environment end-to-end voice encryption for maxi- The flexible and secure management and are interoperable. mum security requirements. Connec- functions allow you to form and man- tions via leased lines/dedicated lines age individual cryptographic groups in are just as feasible as connections via any way you want – hierarchical, hori- PSTN, satellite or microwave. zontal or overlapping. In case of equip- ment loss, protection is ensured as individual units can be excluded from the network at any time.

4 ... but there is also a high-security encryption solution for each telephone technology

Security solutions from Crypto AG of- on your desktop, in the secretarial de- Convenient handling is provided by fer comprehensive protection from in- partment where they are operated, or the KHC-2000 Key Handling Centre, for terception for classic PSTN networks can be implemented to be shared by the central or decentralised manage- by means of end-to-end encryption. several users. ment of security data in the encryption units and for key changes. By forming Flexibility for use in your existing Interconnectivity between the fixed cryptographically protected groups telephone infrastructure is ensured, network and the GSM network is en- you can reproduce your organisation’s without the need for any change to sured by the compatibility of the pro- structure in the communication struc- your working practices. The technical ducts with PSTN encryption and the ture and make changes at any time. integration does not require any ad- secure GSM telephone. Theses sys- When working in online mode you justments to existing systems or equip- tems can also be used for applications can establish secure connections to ment. Encryption units can be placed via satellite connection. any single unit in the network without risk.

Secure voice end-to-end communications in PSTN and GSM networks and via satellite links

Phone 1 Phone 3

Phone Border Guard Phone 2

Headquarters PSTN Phone Encryption PBX Laptop VIP

PSTN PSTN Key Encryption Encryption Handling Centre

PSTN Encryption Branch Office PSTN

PBX SAT Traveller GSM Phone GSM Secretary

Phone VIP Sat PSTN Phone Terminal Encryption Sat PSTN Branch Office Phone Terminal Encryption

5 Crypto AG – To Remain Sovereign Crypto AG, Headquarters Crypto AG is your ideal partner for the effi- Crypto AG P.O. Box 460 cient and secure handling of information. CH-6301 Zug As a legally and economically independent Tel. +41 41 749 77 22 Fax +41 41 741 22 72 Swiss company, we are not subject to any [email protected] www.crypto.ch export restrictions. Crypto AG, We have developed, manufactured and Regional Offices implemented custom security solutions for Abidjan Crypto AG over 55 years. The package we offer features 01 B.P. 5852 Abidjan 01 the latest technology solutions and com- Ivory Coast Tel. +225 22 41 17 71 prehensive services. Throughout the entire Fax +225 22 41 17 73

lifetime of your system, we provide you with Crypto AG – Abu Dhabi support services to guarantee autonomous P.O. Box 41076 Abu Dhabi operation and high availability whatever the United Arab Emirates user environment. Tel. +971 2 64 22 228 Fax +971 2 64 22 118 You too can rely on the expertise and capabil- Buenos Aires ities of Crypto AG – just like our customers in Crypto AG Maipu 1256 PB “A” over 130 countries. 1006 Buenos Aires Argentina Tel. +54 11 4312 1812 Fax +54 11 4312 1812

Kuala Lumpur Crypto AG www.crypto.ch Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights 50490 Malaysia Tel. +60 3 2080 2150 Fax +60 3 2080 2140

Muscat Crypto AG Regional Office P.O. Box 2911 Seeb PC 111 Sultanate of Oman Tel. +968 2449 4966 Fax +968 2449 8929

A member of

The Crypto Group HC-2203 – EN/0830 ©2008 Crypto AG – CP Voice