A secure telephone is a
telephone
A telephone, colloquially referred to as a phone, is a telecommunications device that enables two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most ...
that provides
voice security in the form of
end-to-end encryption
End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can ...
for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a
man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
. Concerns about massive growth of
telephone tapping
Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
incidents led to growing demand for secure telephones.
The practical availability of secure telephones is restricted by several factors; notably politics,
export issues, incompatibility between different products (the devices on each side of the call have to use the same protocol), and high (though recently decreasing) price of the devices.
Well-known products
200px, Secure telephone of the Commandant colloquially known as ''
'' at the Constantine Palace">Vertushka'' at the Constantine Palace, one of the residences of the President of Russian Federation">Constantine_Palace.html" ;"title="Vertushka'' at the Constantine Palace">Vertushka'' at the Constantine Palace, one of the residences of the President of Russian Federation
The best-known product on the US government market is the
STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephon ...
family. However, this system has now been replaced by the Secure Terminal Equipment (STE) and
SCIP standards which defines specifications for the design of equipment to secure both
data
Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ...
and voice. The SCIP standard was developed by the
NSA and the
US DOD to derive more
interoperability
Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange, a broader de ...
between secure communication equipment. A new family of standard secure phones has been developed based on Philip Zimmermann's VoIP encryption standard
ZRTP
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over IP (VoIP) phone telephony call based on the Real-time Transport Protocol ...
.
VoIP and direct connection phones
As the popularity of
VoIP
Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
grows, secure telephony is becoming more widely used. Many major hardware and software providers offer it as a standard feature at no extra cost.
Examples include the
Gizmo5 and
Twinkle
Twinkle may refer to:
* Twinkling, the variation of brightness of distant objects
People
* Twinkle (singer) (1948–2015), born Lynn Annette Ripley, English singer-songwriter
* Twinkle Bajpai, Indian singer, television and film actress
* Twinkl ...
. Both of the former work with offerings from the founder of PGP,
Phil Zimmermann
Philip R. Zimmermann (born 1954) is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption ...
, and his VoIP secure protocol,
ZRTP
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over IP (VoIP) phone telephony call based on the Real-time Transport Protocol ...
. ZRTP is implemented in, amongst others,
Ripcord Networks product SecurePC with up to NSA Suite B compliant Elliptic Curve math libraries. ZRTP is also being made available for mobile
GSM
The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
CSD as a new standard for non-VoIP secure calls.
The U.S.
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
is developing a secure phone based on Google's
Android called
Fishbowl.
Historically significant products
Scramblers were used to
secure voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or Voice over IP, IP.
History
The implementation of voice en ...
traffic during
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
(1939-1945), but were often intercepted and decoded due to scrambling's inherent insecurity. The first true secure telephone (operational from 1943) was
SIGSALY
SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure voice, secure speech system used in World War II for the highest-level Allies of World War II, Allied communications. It pioneered a number of digital co ...
, a massive device that weighed over 50 tons. The NSA, formed in 1952, developed a series of secure telephones, including the
STU I of the 1970s,
STU II and
STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephon ...
, as well as
voice-encryption devices for military telephones.
In 1989 an Irish company called Intrepid developed one of the most advanced secure phones. Called "Milcode",
[
]
the phone was the first to implement
code-excited linear prediction (or CELP) which dramatically improved voice quality and user-operability over previous LPC (Linear Predictive Coding) and LPC-10e versions.
Milcode also boasted significantly higher levels of security than previous secure telephones. The base model offered a proprietary encryption algorithm with a key-length of 512 bits, and a more advanced model with a key-length of 1024 bits. Key exchange used a public key, based on
Diffie-Hellman, as opposed to a plug-in datakey. A new key was generated for each phone call. Milcode was also able to encrypt fax and data and was electromagnetically shielded to NATO
TEMPEST standards.
Other products of historical significance are
PGPfone and
Nautilus
A nautilus (; ) is any of the various species within the cephalopod family Nautilidae. This is the sole extant family of the superfamily Nautilaceae and the suborder Nautilina.
It comprises nine living species in two genera, the type genus, ty ...
(designed as a non-
key escrow alternative to
Clipper
A clipper was a type of mid-19th-century merchant sailing vessel, designed for speed. The term was also retrospectively applied to the Baltimore clipper, which originated in the late 18th century.
Clippers were generally narrow for their len ...
, now officially discontinued, but still available on
SourceForge
SourceForge is a web service founded by Geoffrey B. Jeffery, Tim Perdue, and Drew Streib in November 1999. SourceForge provides a centralized software discovery platform, including an online platform for managing and hosting open-source soft ...
), ''SpeakFreely'', and the security VoIP protocol wrapper
Zfone (developed by
Phil Zimmermann
Philip R. Zimmermann (born 1954) is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption ...
, who wrote the
PGP software).
Scrambling, generally using a form of
voice inversion
Voice inversion scrambling is an analog method of obscuring the content of a transmission. It is sometimes used in public service radio, automobile racing, cordless telephones and the Family Radio Service. Without a descrambler, the transmission ...
, was available from suppliers of electronic hobbyist kits and is common on
FRS radios. Analog scrambling is still used, as some telecommunications circuits, such as HF links and telephone lines in the developing world, are of very low quality.
See also
*
Microphone blocker
*
Mobile phone tracking
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers ...
*
Secure Real-time Transport Protocol
The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multica ...
(SRTP)
*
SCIP
*
TETRA
*
A5/1
*
ZRTP
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over IP (VoIP) phone telephony call based on the Real-time Transport Protocol ...
*
Secure voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or Voice over IP, IP.
History
The implementation of voice en ...
References
External links
Seminar on crypto phones by Zidu Wang
{{Refimprove, date=May 2021
Cryptographic hardware