SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Technical Sheet - VoIP version




Detailed overview of the technologies used by PrivateWave

PrivateWave uses only standard protocols and technologies that have been reviewed and widely accepted by
the security and scientific communities (ZRTP, SRTP, SIP/TLS) to guarantee a maximum security.

Ask your security expert!


    PrivateGSM VoIP features

    Security                                                                          Simplicity
       Flexible security model:                                                          Software only solution for smartphones
          - ZRTP for end-to-end voice encryption                                         No change in the way you make secure calls:
          - SRTP for end-to-site voice encryption                                        calls to anyone from address book
          - SIP/TLS for signaling protection                                             by adding +801 secure prefix
       Use of only IETF standardized protocols                                           Secure calling to landlines and VoIP phones
       Security compliant with FIPS, NIST and NSA                                        with multiple certified secure PBX
       Based on open source technology


    Performance
       Low average Bandwith:                                        Low latency (depends on network):
          - in standby: negligible
          - during conversation: (100-200 K/minute)                  Technology               Wifi    HSDPA       UMTS      EDGE       GPRS   Satellite
       International calls and worldwide roaming
                                                                     Call Delay Performance
       Extremely low battery drain


    Supported Technology
       Operating Systems:                                           Supported Networks:
         - Symbian/Nokia S60 3rd and 5th edition                      - Any IP-enabled network                - WiFi
         - iPhone 3.0 and higher                                      - 2G (GPRS, EDGE, 1xRTT)                - Satellite
         - Blackberry 4.6 and higher                                  - 3G (UMTS, HSDPA, EV-DO)


    Encryption Algorithms                                                             Audio Codecs
       ECDH 256 bit / 384 bit (default) / 521 bit (Elliptic Curve                        AMR Narrowband 4.75 kbit/s
       Diffie-Hellman)                                                                   AMR Narrowband 12.2 kbit/s
       AES256 (CTR) for ZRTP
       AES128 (CTR) for SRTP
       SIP/TLS with X509v3 digital certificates




Copyright © 2005-2010 KHAMSA Italia Spa. All rights reserved.
Technical Sheet - VoIP




Encryption protocols

                                             End to End

                                               (ZRTP)               internet



                                                                           End to Site (SRTP)




End-to-End encryption security (ZRTP)
Security is established between the caller and the called phone without ability of any networking device in the middle to decipher the communication.
End-to-end security is provided with ZRTP, the open IETF standard voice encryption system invented by Philip Zimmermann that requires human-based
verification for the encryption of a call.

End-to-Site encryption security (SRTP with SDES key exchange)
SRTP is the open IETF standard voice encryption system to protect the communication between two peers sending the encryption keys of a phone call
through the secure connection (SIP/TLS) that both peers have established with the VoIP PBX. It is defined as an end-to-site encryption, because the PBX
decrypts and re-encrypts the audio flow exchanged between both parties of a phone call, so the PBX can observe and record the communication. This
kind of security (end-to-site) is required for integration of secure communication into the existing traditional landline telephony network.

Communication protocols
We use only IETF (Internet Engineering Task Force) standard communication protocols to maximize compatibility, transparency and ROI for integration into
existing infrastructure. For telephony signaling the SIP protocol (RFC3261) is used, which is protected by Transport Layer Security (RFC4346) communica-
tion channel with server side x509v3 digital certificate verification. Standard RTP (RFC3550) protocol, along with the security extensions SRTP (RFC3711),
are used to transport voice. A proprietary, very simple, protocol obfuscation system is provided in order to bypass eventual VoIP blocks. A ZRTP proprietary
extension lets the traffic pass through PBX that otherwise may block it.

Cryptography
Encryption algorithms
ZRTP, SRTP and SIP/TLS only use the best symmetric and asymmetric encryption and hashing algorithms.

    ·   ZRTP uses AES256 in counter mode (CTR) for symmetric encryption in compliance with FIPS 197 security requirements and ECDH 384bit for
        asymmetric encryption DH key exchange in compliance with USA NSA Suite B security requirements, NIST SP800-56A standard and ECDSA FIPS
        186-3. It could be configured also to use other ZRTP supported encryption algorithms for compatibility with third party software supporting ZRTP.

    ·   SRTP employs AES128 in counter mode (CTR) key agreement system, with keys agreed by parties across the TLS protected SIP channel through the PBX.

    ·   TLS employs AES128 to encipher the SIP connection symmetrically given the verification of a x509v3 digital certificate whose RSA key is 2048bit.

Random number generation
The random number generation is seeded by an unpredictable physical source of entropy (voice audio sample recorded from microphone and free
running counters available on ARM processors) that complies with FIPS-186-2-CR1 security requirements. It is further processed by a Deterministic
Random Bit Generation, compliant with NIST SP800-90 security requirements.

Open source
All encryption related libraries and technologies used by PrivateGSM are provided 100% free of backdoor. The source code of the security library is
provided for free in open source and has been publicly reviewed by Philip Zimmermann and by a vast number of scientific communities. The open source
solution guarantees a politically neutral solution and provides much easier source code review activities.

Multimedia codec
In order to provide a better voice quality for the right networking environment PrivateGSM supports extremely narrowband audio codecs that compress
the voice that will be enciphered and then sent across the network. Supported codecs are AMR-NB 4.75 and AMR-NB 12.2.
In order to reduce the required bandwidth and maximize the radio resource efficiency we employ voice activity detection (VAD) techniques that prevent
the phone from sending full data while not speaking. Note: on some platforms, only certain codecs are supported because of the hardware limitation.




More information at: support@privatewave.com                           www.privatewave.com

Más contenido relacionado

La actualidad más candente

How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondSiddharth Rao
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open SourceSuhas Desai
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 
Stentofon VOIP
Stentofon VOIPStentofon VOIP
Stentofon VOIPkerryorr
 
Stentofon Pulse Power Point
Stentofon Pulse Power PointStentofon Pulse Power Point
Stentofon Pulse Power Pointlagoonsurfer
 
xbee pro digi-mesh 2.4 oem rf modules
xbee pro  digi-mesh  2.4 oem rf modulesxbee pro  digi-mesh  2.4 oem rf modules
xbee pro digi-mesh 2.4 oem rf modulesSyamim Sempoi
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetNam TruongGiang
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityP1Security
 

La actualidad más candente (19)

How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
Vo ip
Vo ipVo ip
Vo ip
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Week14
Week14Week14
Week14
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Yeastar My pbx standard_datasheet_en
Yeastar My pbx standard_datasheet_enYeastar My pbx standard_datasheet_en
Yeastar My pbx standard_datasheet_en
 
Week14
Week14Week14
Week14
 
Stentofon VOIP
Stentofon VOIPStentofon VOIP
Stentofon VOIP
 
Stentofon Pulse Power Point
Stentofon Pulse Power PointStentofon Pulse Power Point
Stentofon Pulse Power Point
 
xbee pro digi-mesh 2.4 oem rf modules
xbee pro  digi-mesh  2.4 oem rf modulesxbee pro  digi-mesh  2.4 oem rf modules
xbee pro digi-mesh 2.4 oem rf modules
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheet
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 

Destacado

PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateWave Italia SpA
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 

Destacado (7)

PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_en
 
B2B_Dubo
B2B_DuboB2B_Dubo
B2B_Dubo
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_en
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_en
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 

Similar a Technical Sheet - PrivateGSM VoIP - english

Similar a Technical Sheet - PrivateGSM VoIP - english (20)

4g technology
4g technology4g technology
4g technology
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Yeastar My pbx soho_datasheet_en
Yeastar My pbx soho_datasheet_enYeastar My pbx soho_datasheet_en
Yeastar My pbx soho_datasheet_en
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Certified Hospitality Technology Professional
Certified Hospitality Technology ProfessionalCertified Hospitality Technology Professional
Certified Hospitality Technology Professional
 
VoIP
VoIPVoIP
VoIP
 
Audiocodes, Plantronics Cisco
Audiocodes, Plantronics CiscoAudiocodes, Plantronics Cisco
Audiocodes, Plantronics Cisco
 
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 200914 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009
 
14 Net Quintum
14 Net Quintum14 Net Quintum
14 Net Quintum
 
voip elements by Karan singh cypher
voip elements by Karan singh cypher voip elements by Karan singh cypher
voip elements by Karan singh cypher
 
Yeastar My pbx u100_datasheet_en
Yeastar My pbx u100_datasheet_enYeastar My pbx u100_datasheet_en
Yeastar My pbx u100_datasheet_en
 
4g technology
4g technology4g technology
4g technology
 
T38 g datasheet-yealink
T38 g datasheet-yealinkT38 g datasheet-yealink
T38 g datasheet-yealink
 
Voip internet
Voip internet Voip internet
Voip internet
 
T32 g datasheet-yealink
T32 g datasheet-yealinkT32 g datasheet-yealink
T32 g datasheet-yealink
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
Yeastar My pbx u300_datasheet_en
Yeastar My pbx u300_datasheet_enYeastar My pbx u300_datasheet_en
Yeastar My pbx u300_datasheet_en
 
Core Stor Ip Recording V1
Core Stor Ip Recording V1Core Stor Ip Recording V1
Core Stor Ip Recording V1
 
VOIP security
VOIP securityVOIP security
VOIP security
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 

Más de PrivateWave Italia SpA

Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiPrivateWave Italia SpA
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)PrivateWave Italia SpA
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)PrivateWave Italia SpA
 
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologiesPrivateWave Italia SpA
 

Más de PrivateWave Italia SpA (18)

Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Private gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_enPrivate gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_en
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 
Enterprise VolP Security Suite
Enterprise VolP Security SuiteEnterprise VolP Security Suite
Enterprise VolP Security Suite
 
Privatewave e i social network
Privatewave e i social networkPrivatewave e i social network
Privatewave e i social network
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tutti
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologies
 

Último

E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In DelhiSoniyaSingh
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilabledollysharma2066
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 

Último (12)

E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Govindpuri Delhi 💯Call Us 🔝8264348440🔝
 
南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 

Technical Sheet - PrivateGSM VoIP - english

  • 1. Technical Sheet - VoIP version Detailed overview of the technologies used by PrivateWave PrivateWave uses only standard protocols and technologies that have been reviewed and widely accepted by the security and scientific communities (ZRTP, SRTP, SIP/TLS) to guarantee a maximum security. Ask your security expert! PrivateGSM VoIP features Security Simplicity Flexible security model: Software only solution for smartphones - ZRTP for end-to-end voice encryption No change in the way you make secure calls: - SRTP for end-to-site voice encryption calls to anyone from address book - SIP/TLS for signaling protection by adding +801 secure prefix Use of only IETF standardized protocols Secure calling to landlines and VoIP phones Security compliant with FIPS, NIST and NSA with multiple certified secure PBX Based on open source technology Performance Low average Bandwith: Low latency (depends on network): - in standby: negligible - during conversation: (100-200 K/minute) Technology Wifi HSDPA UMTS EDGE GPRS Satellite International calls and worldwide roaming Call Delay Performance Extremely low battery drain Supported Technology Operating Systems: Supported Networks: - Symbian/Nokia S60 3rd and 5th edition - Any IP-enabled network - WiFi - iPhone 3.0 and higher - 2G (GPRS, EDGE, 1xRTT) - Satellite - Blackberry 4.6 and higher - 3G (UMTS, HSDPA, EV-DO) Encryption Algorithms Audio Codecs ECDH 256 bit / 384 bit (default) / 521 bit (Elliptic Curve AMR Narrowband 4.75 kbit/s Diffie-Hellman) AMR Narrowband 12.2 kbit/s AES256 (CTR) for ZRTP AES128 (CTR) for SRTP SIP/TLS with X509v3 digital certificates Copyright © 2005-2010 KHAMSA Italia Spa. All rights reserved.
  • 2. Technical Sheet - VoIP Encryption protocols End to End (ZRTP) internet End to Site (SRTP) End-to-End encryption security (ZRTP) Security is established between the caller and the called phone without ability of any networking device in the middle to decipher the communication. End-to-end security is provided with ZRTP, the open IETF standard voice encryption system invented by Philip Zimmermann that requires human-based verification for the encryption of a call. End-to-Site encryption security (SRTP with SDES key exchange) SRTP is the open IETF standard voice encryption system to protect the communication between two peers sending the encryption keys of a phone call through the secure connection (SIP/TLS) that both peers have established with the VoIP PBX. It is defined as an end-to-site encryption, because the PBX decrypts and re-encrypts the audio flow exchanged between both parties of a phone call, so the PBX can observe and record the communication. This kind of security (end-to-site) is required for integration of secure communication into the existing traditional landline telephony network. Communication protocols We use only IETF (Internet Engineering Task Force) standard communication protocols to maximize compatibility, transparency and ROI for integration into existing infrastructure. For telephony signaling the SIP protocol (RFC3261) is used, which is protected by Transport Layer Security (RFC4346) communica- tion channel with server side x509v3 digital certificate verification. Standard RTP (RFC3550) protocol, along with the security extensions SRTP (RFC3711), are used to transport voice. A proprietary, very simple, protocol obfuscation system is provided in order to bypass eventual VoIP blocks. A ZRTP proprietary extension lets the traffic pass through PBX that otherwise may block it. Cryptography Encryption algorithms ZRTP, SRTP and SIP/TLS only use the best symmetric and asymmetric encryption and hashing algorithms. · ZRTP uses AES256 in counter mode (CTR) for symmetric encryption in compliance with FIPS 197 security requirements and ECDH 384bit for asymmetric encryption DH key exchange in compliance with USA NSA Suite B security requirements, NIST SP800-56A standard and ECDSA FIPS 186-3. It could be configured also to use other ZRTP supported encryption algorithms for compatibility with third party software supporting ZRTP. · SRTP employs AES128 in counter mode (CTR) key agreement system, with keys agreed by parties across the TLS protected SIP channel through the PBX. · TLS employs AES128 to encipher the SIP connection symmetrically given the verification of a x509v3 digital certificate whose RSA key is 2048bit. Random number generation The random number generation is seeded by an unpredictable physical source of entropy (voice audio sample recorded from microphone and free running counters available on ARM processors) that complies with FIPS-186-2-CR1 security requirements. It is further processed by a Deterministic Random Bit Generation, compliant with NIST SP800-90 security requirements. Open source All encryption related libraries and technologies used by PrivateGSM are provided 100% free of backdoor. The source code of the security library is provided for free in open source and has been publicly reviewed by Philip Zimmermann and by a vast number of scientific communities. The open source solution guarantees a politically neutral solution and provides much easier source code review activities. Multimedia codec In order to provide a better voice quality for the right networking environment PrivateGSM supports extremely narrowband audio codecs that compress the voice that will be enciphered and then sent across the network. Supported codecs are AMR-NB 4.75 and AMR-NB 12.2. In order to reduce the required bandwidth and maximize the radio resource efficiency we employ voice activity detection (VAD) techniques that prevent the phone from sending full data while not speaking. Note: on some platforms, only certain codecs are supported because of the hardware limitation. More information at: support@privatewave.com www.privatewave.com