EX4U Telecom
OTP

  ecrypto_trustworthy.gif ecrypto_interception1.jpg  
 
 E-CRYPTO  
    

E-Crypto are the first and only fully trustworthy solution for completely confidential mobile phone calls.

E-Crypto phones are very easy to use and provide hassle-free, convenient security.They are all based on the strongest encryption algorithms - AES 256 and Twofish.
Very long keys ensure the security of your calls far into the future. E-Crypto products contain no backdoors for anyone and can be fully verified by independent researchers.
 
E-Crypto phones offer worldwide protection for your confidential phone calls, whether by GSM cellular network (850, 900, 1800, 1900 Mhz), satellite or land line.

  gsm_protect_yourself.gif
   
 

E-Crypto G10i  Quad Band

The E-Crypto G10i is a lightweight quad-band GSM mobile phone that comes with full source code available for independent review. 

Secures your voice's privacy!

  • Strongest and most secure algorithms available today
  • AES256 and Twofish
  • 4096 bit Diffie-Hellman key exchange with SHA256 hash function
  • Readout-hash based key authentication
  • 256 bit effective key length
  • Encryption key is destroyed as soon as the call ends
  • Source code available online for independent security assessments
  • Also supports unencrypted calls, unencrypted SMS, address book, calendar etc.
  • Works with any GSM 850/900/1800/1900 network that supports circuit-switched data calls
  • Standby: up to 150 hours
  • Talk time: Secure up to 5hours
  • GPRS, OBEX, WLAN, Bluetooth, IrDa, USB, SD-card
  • Dimensions: 98.5 x 51.4 x 15.8 mm
  • Weight: 99 g incl. battery

 

   secure communication.jpg
     
 

ecrypto_CP301.jpg

Operational Features
Talk time up to 8 hours - standby time up to 270 hours

Dimensions & Weight
104.5 x 59 x 15.75 mm - 110g incl. battery - integrated antenna

Display
2.8-inch sunlight-readable transreflective TFT LCD screen with LED backlight @ 240x320, 64k colors

Navigation / Buttons
5-way navigation keypad  - dedicated talk / hang-up buttons - volume up / down buttons

Connectivity
Integrated USB/ power/ audio connector
MicroSD memory card slot
Bluetooth V2.0 with Enhanced Data Rate and A2DP for stereo wireless headsets
IEEE 802.11 b/g Wireless LAN

Audio codecs
Encrypted calls: CELP and ACELP® VLBR4
Decoding & playback: WAV, WMA, AMR-NB, AMR-WB, AAC, AAC+, eAAC+, QCP, MP3, polyphonic ring tones

CMOS Camera
2.0 megapixels resolution (can be completely disabled upon request)

Standard Accessories
100-240V AC adapter - USB sync cable - tereo headset with microphone

E-Crypto 301
Secure GSM Phone with Voice & SMS Encryption

TECHNICAL SPECIFICATIONS

Radio
GSM quad-band 850/900/1800/1900MHz
EDGE EGPRS class B, multi-slot class 10
CSD

Voice Encryption
Strongest and most secure algorithms available today AES256 and Twofish
4096 bit Diffie-Hellman key exchange with SHA256 hash function
readout-hash based key authentication
256 bit effective key length
encryption key is destroyed as soon as the call ends

Message Encryption
Based on the same strong encryption algorithms used for E-Crypto voice encryption - 4096 bit Diffie-Hellman initial key exchange,  AES256 and Twofish message encryption with 256 bit effective key length. Supports long SMS and encrypted self-destructing "Eyes Only" SMS.

Device Protection

Encrypted storage system for contacts, messages, notes and keys with smart folders protects confidential data against unauthorized access
hardened WM 6.1 operating system with granular security management and streamlined, security-optimized components and communication stacks protects device against outside attacks

E-Crypto phones are the only secure mobile phones on the market with full source code published for independent security assessments. They contain no »proprietary« or »secret« encryption, no backdoors, no key-escrow, no centralized or operator-owned key generation, and require no key registration.

Interoperability
Fully compatible with all E-Crypto phones circuit-switched mobile, satellite and fixed-line encryption products
PBX integration available

Trustworthy Voice & SMS Encryption

The  E-Crypto 301 comes with full source code available for independent review. Finally, you can  perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust your security to. The E-Crypto 301 enables you to put the trust where it belongs in a trustworthy, open and scientific verification process.
E-Crypto technology is based on well-researched algorithms for both encryption and voice processing. It features the strongest encryption available combined with key lengths that provide peace of mind today and in the future.

Optional Accessories
12V car charger - solar panel charger - vehicle mount kit

Satellite Upgrade Option
Upgradeable to dual-mode secure GSM and Thuraya satellite communications using the E-Crypto T2 upgrade package 

   
 

ecrypto_CP400.jpg

Operational Features
Talk time up to 5 hours
standby time up to 360 hours

Dimensions & weight
107.9 x 53.1 x 13.7 mm
118g incl. battery
integrated antenna

Display
3.2-inch sunlight-readable touch-sensitive TFT LCD
screen with LED backlight @ 480 x 800, 64k colors

Navigation / Buttons
Dedicated talk / hang-up, volume up / down, home and back     buttons
touch-activated zoom bar

Connectivity
Integrated USB/ power/ audio connector
MicroSD memory card slot, SD2.0 compatible

Bluetooth
V2.0 with Enhanced Data Rate and A2DP for stereo wireless headsets
GPS
IEEE 802.11 b/g Wireless LAN

Audio Codecs
Encrypted calls: CELP and ACELP® VLBR4
Decoding & playback: WAV, WMA, AMR-NB, AMR-WB, AAC, AAC+, eAAC+, QCP, M4A, MP3, MIDI, polyphonic ring tones

CMOS Camera
5.0 megapixels resolution with auto focus (can be completely disabled upon request)

Standard Accessories
100-240V AC adapter
USB sync cable
stereo headset with microphone

Optional Accessories
12V car charger
solar panel charger
vehicle mount kit

E-Crypto 400
Secure IP Mobile Phone with Voice & SMS EncryptionSecure IP Mobile Phone with Voice & SMS Encryption

The E-Crypto 400 is a secure IP mobile phone for secure voice over IP communication on any network GSM, 3G or WLAN.

The E-Crypto 400 gives you the flexibility to conduct secure voice over IP calls using either GSM, 3G/UMTS, or wireless local area networks. This unmatched flexibility combined with secure messaging, a hardened operating system and encrypted storage for your confidential contacts, messages and notes provides you with 360-degree protection in a sleek, elegant package including a brillant 3.2-inch TFT LCD high-resolution touch screen.

  • Quad-band GSM
  • Dual-band UMTS / 3G
  • Wireless LAN
  • Voice & SMS encryption
  • Secure storage
  • Hardened operating system
  • Standby: Up to 360 hours
  • Secure talk time: Up to 5 hours


TECHNICAL SPECIFICATIONS

Radio

  • GSM quad-band 850/900/1800/1900 MHz
  • UMTS HSDPA/WCDMA 900/2100 MHz with HSUPA support
  • Up to 2 Mbps uplink, up to 7 Mbps downlink speed


Voice Encryption

  • Secure voice over IP communication on any network GSM, 3G, WLAN
  • strongest and most secure algorithms available today  AES256 and Twofish
  • 4096 bit Diffie-Hellman key exchange with SHA256 hash function
  • readout-hash based key authentication
  • 256 bit effective key length
  • encryption key is destroyed as soon as the call end


Message Encryption

  • Based on the same strong encryption algorithms used for E-Crypto phone voice encryption
  • 4096 bit Diffie-Hellman initial key exchange, AES256 and Twofish message encryption with
  • 256 bit effective key length. Supports long SMS and encrypted self-destructing "Eyes Only" SMS.

 
Device Protection
Encrypted storage system for contacts, messages, notes and keys with smart folders protects confidential data against unauthorized access hardened WM 6.5 operating system with granular security management and streamlined, security-
optimized components and communication stacks protects device against outside attacks

E-Crypto phones are the only secure mobile phones on the market with full source code published for independent security assessments.
They contain no »proprietary« or »secret« encryption, no backdoors, no key-escrow, no centralized or operator-owned key generation, and require no key registration.


Interoperability
Fully compatible with all E-Crypto IP mobile, satellite and fixed-line encryption products
IP PBX integration with virtual extensions

Trustworthy Voice & SMS Encryption
The E-Crypto 400 comes with full source code available for independent review. Finally, you can perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust your security to.
The E-Crypto 400 enables you to put the trust where it belongs in a trustworthy, open and scientific verification process.
E-Crypto  technology is based on well-researched algorithms for both encryption and voice processing. It features the strongest encryption available combined with key lengths that provide peace of mind today and in the future

   

 

 

 

E_Crypto_IP19.jpg 

 
Operational Features

  • LED call indication
  • programmable secure phonebook
  • redial function
  • ringer and hand-set volume control
  • mute function
  • DND (do encryption available combined with key lengths not disturb) mode that provide peace of mind today and in the future.

Dimensions & Weight

  • 230  x  200  x  30 mm  /  9.1  x  7.9  x  1.2 in.,
  • 690g / 1.5lbs without footstand (920g / 2.1lbs with footstand)
  • black or light gray color scheme

Display

  • 4.3-inch sunlight-readable touch-sensitive TFT LCD
  • screen with LED backlight @ 480 x 272, 16.7mn colors

Connectivity

  • RJ-4P4C headset connector
  • optional 2x USB Type A connectors for special communications equipment

Power

  • IEEE 802.3ad, Class 1 Power over Ethernet or AC power 100 to 240 VAC, 50-60 Hz, 7 watts maximum operating power

EMI/EMC & Safety Approvals

  • FCC Part 15 Subpart B Class B, CE
  • IEC60950-1:2001

Standard Accessories

  • 100-240V AC power adapter
  • full cable set

Optional Accessories

  • 100-240V AC uninterruptible power supply
  • solar panel power pack
  • headset with background noise suppression

E-Crypto IP19
The E-Crypto IP19 phone is a secure IP desktop phone for end-to-end encrypted voice over IP communications on any IP network.

The E-Crypto IP19 features a Gigabit Ethernet interface with an R45 plug, and optional support for wireless LAN. It uses the same encryption engine as E-Crypto's secure mobile and satellite phones, featuring 256-bit AES and Twofish session encryption and a 4096-bit Diffie-Hellman key exchange, readout-hash based key authentication, and session keys that are newly generated for each call and destroyed after the call ends.

The E-Crypto IP19 is easy to use and easy to set up, using a large color touch screen display. Fully compatible with E-Crypto IP mobile and satellite phones, it offers the latest technology for reliable and secure end-to-end encrypted voice over IP communications.

  • End-to-end IP voice encryption
  • Easy to use, easy to install
  • Compatible with Inmarsat BGAN, Thuraya IP, VSAT satellite terminals

 
TECHNICAL SPECIFICATIONS

Telephone IP Network Interface

  • Gigabit Ethernet IEEE 802.3 10/100/1000 BaseT with RJ45 plug
  • Compatible with Inmarsat BGAN satellite terminals
  • Optional IEEE 802.11b/g/n wireless LAN support

Voice Encryption

  • Secure voice over IP communication on any IP network
  • strongest and most secure algorithms available today - AES256 and Twofish
  • 4096 bit Diffie-Hellman key exchange with SHA256 hash function
  • readout-hash based key authentication
  • 256 bit effective key length
  • encryption key is destroyed as soon as the call ends

Device Protection

  • Encrypted storage system for contacts protects confidential data against unauthorized access
  • hardened Linux operating system with security-optimized components and communication stacks protects device against outside attacks.
  • E-Crypto phones are the only secure phones on the market with full source code available for independent security assessments. They contain no »proprietary« or »secret« encryption, no backdoors, no key-escrow, no centralized or Trustworthy Voice Encryption operator-owned key generation, and require no key registration.

Interoperability

  • Fully compatible with all E-Crypto IP mobile, satellite and fixed-line encryption products IP PBX integration with virtual extensions.

Operational Features
LED call indication  programmable secure phonebook redial function ringer and handset volume control mute function DND mode (do not disturb).

Trustworthy Voice & SMS Encryption

  • The E-Crypto IP19 comes with full source code available for independent review. Finally, you can perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust your security to.
  • The E-Crypto IP19 enables you to put the trust where it belongs in a trustworthy, open and scientific verification process.
  • E-Crypto  technology is based on well-researched algorithms for both encryption and voice processing. It features the strongest encryption available combined with key lengths that provide peace of mind today and in the future.


     
   

See also YES ONE and YES TWO Free Roaming SIM

 

   ecrypto_interception2.jpg
 

 

 

E-Crypto PSTN/1i
 
The PSTN/1 is a secure desktop phone that connects to the public switched telephone network and comes with full source code available for independent review. Secures your voice's privacy !

  • Strongest and most secure algorithms available today
  • AES256 and Twofish
  • 4096 bit Diffie-Hellman key exchange with SHA256 hash function
  • Readout-hash based key authentication
  • 256 bit effective key length
  • Encryption key is destroyed as soon as the call ends
  • Source code available online for independent security assessments
  • Standard analog PSTN/POTS interface with RJ11/RJ13 plug
  • Audio port for interfacing the PSTN/1 with video conferencing equipment
  • Integrated interface for connection to Inmarsat , Iridium or Thuraya satellite terminals
  • One Touch switch for encrypted / non encrypted calls
  • Dimensions: 50 x 275 x 172mm (Encryption Unit)
  • Weight: 2200g

     
  Thuraya_SG2520.jpgecrypto_satellite_T3.jpg

E-Crypto T3 Thuraya Satellite Option
 
The T2 Thuraya satellite option is the perfect solution for secure communications in areas without GSM coverage or if you do not with to depend on local network infrastructure.

Secure Thuraya satellite communication option for all E-Crypto mobile phones.
Secure satellite communication utilizing the crypto engine with the strongest and most secure algorithms available today - AES256 and Twofish.

  • 4096 bit Diffie-Hellman key exchange with SHA256 hash function
  • Readout-hash based key authentication
  • 256 bit effective key length
  • Encryption key is destroyed assoon as the call ends
  • Source code available online for independent security assessments
  • Consists of wireless docking station for Thuraya satellite terminal and firmware upgrade for all current E-Crypto mobile phones
  • Talk time: Supports up to 8 hours of encrypted Thuraya satellite calls (depending on usage patterns) with any E-Crypto mobile phone.
  •      
     

    E-Crypto for Windows - WIN

    Free software for land lines.

    Runs on any modern desktop or notebook computer running under Microsoft Windows(TM)
    Allows for easy and secure communication to and from mobile E-Crypto products as well as to other E-Crypto for Windows users
    Requires supported modem on POTS or ISDN landline (Galaxy MU32S, Modems with the Cirrus-Chipset"CL14xx", ELSA microlink 28.8TQV (testing reference), US-Robotics56000 courier) or one of the following GSM modems: Nokia 9210 or Siemens S35/M35/C35
    Sorry; the E-Crypto for Windows Application does not work with Winmodems at this time.
    Our E-Crypto customers have access to this download in our secure customer support area.

         
      ecrypto-pbx.png E-Crypto ISDN and VOIP Gateway

    The E-Crypto Gateway for ISDN and Voice over IP (VoIP) private branch exchanges is fully compatible with all E-Crypto secure mobile phones.

       

     

    See also YES ONE and YES TWO Free Roaming SIM

      What kind of cryptography and what key length is used in the E-Crypto?

    All calls are encrypted with 256-bit keys using AES and Twofish as counter mode stream ciphers. Using both AES and Twofish results in much stronger encryption than using only one algorithm. For the highly unlikely case that a weakness is discovered in one of the algorithms, the use of the second algorithm provides still a sufficient margin of security. The use of the two very strong algorithms is a unique feature of the E-Crypto. The key used is generated using a 4096-bit Diffie-Hellman shared secret exchange.
    The crypto block diagram is shown below.

    What is the voice compression used in the E-Crypto? How does it sound? Is there a delay?

    The basic design of a secure GSM phone is to take the voice from the microphone, digitize it and run it through a compression algorithm, before encrypting it and sending it via a GSM data call to the other party. The compression algorithm is also called a codec and does with voice what mp3 does with music - making sure it takes up less data.

    E-Crypto use the CELP Codec running at 8kHz. The output stream of the codec is 4.8kbit/second, enabling it to be transported over a 9,6kbit GSM data call.
    The speech and sound quality you can expect is comparable to transcontinental phone calls. You should note that the overall speech quality depends on the GSM signal quality, so degradation does happen in low coverage areas. While in unencrypted GSM the sound quality gets bad and you would experience dropouts as the phone moves out of coverage, with the E-Crypto under the same circumstances the call delay would increase. Simple indicators on the E-Crypto show GSM signal coverage and call quality / delay.
    All calls made with the E-Crypto are subject to a certain delay in the call, as if your call is routed over a satellite link. Most of the call delay originates from the way GSM networks handle the data calls. The E-Crypto must use the GSM data call instead of the normal voice call mode to ensure a transparent communications channel between the two E-Crypto. Because the delay is a side-effect of all GSM data calls there is nothing we can do about it. All available GSM encryption products on the market suffer equally from this delay. The E-Crypto itself introduces comparatively little delay from the voice encoding and encryption.



     trustworthy.gif
      So what does the software architecture of the E-Crypto look like?
     
         
      E_crypto_300_encryption.JPG
     

     

    top

     

     Contact us now for your E-Crypto here ...