NSK 200 Secure Phone System

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Retail Store. Retail Store Solution.
Advertisements

Introduction to Public Land Mobile Network (PLMN)
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
RFID Access Control System March, 2003 Softrónica.
Presented by: Eng. Karam Al-sofy
Pharos Uniprint 8.3.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
GSM to Satcom - NSK 200 over Inmarsat Presented by Torgrim Jorgensen Presented by Torgrim Jorgensen
NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and NSK 250 Secure Management Centre (NDLO/CIS)
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How VoIP and Skype Work.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Connecting to the Internet.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
What is? Digitax TDS Cloud System is a last generation taxi dispatch system and fleet management that uses modern communication technologies (GPRS/UMTS,
MULTIMEDIA ENGINEERING ISE (International School of Engineering, CU) Information and Communication Engineering 4 2.5G Mobile Phone and Network.
FLASH MOBILE | 1 Successful Customer SIM Activation Training.
Aria Telecom Solutions Pvt. Ltd.
GSM FCT for Emergency Applications
SAP Digital Business Services June 2016
What is Travelaps Hotel Reservation System? It is a web based solution for hotels which manage all of the operations of online selling; containing.
Satellite Phones Call and Text, from anywhere
Wireless Network PMIT- By-
Application layer tcp/ip
Virtual Private Network
Instructor Materials Chapter 6 Building a Home Network
Visit for more Learning Resources
Configuring and Troubleshooting Routing and Remote Access
SMS - cash.
Wireless Local Area Network (WLAN)
Radius, LDAP, Radius used in Authenticating Users
NEW PRODUCT – KONFTEL 300Wx
Virtual Private Networks (VPN)
Introduction to Computers
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
BY GAWARE S.R. DEPT.OF COMP.SCI
Introduction to Networking
Home Automation System
Introduction to Computers
practice-questions.html If you Are Thinking about your dumps? Introduction:
McGraw-Hill Technology Education
Networks, telecommunications
Integrated Services Digital Network Prepared By: Muhammad Basheir Omer Tyseer Khalil ISDN.
The Future Secure GSM Workshop CIS Division NATO C3 Agency
Network Models, Hardware, Protocols and number systems
NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and
RKL Remote key loading.
Product Overview.
A Programmer’s Guide to Secure Connections
Chapter 4: Data Communication and Networks
RM5000EX Product Presentation
Networks, telecommunications
McGraw-Hill Technology Education
LO3 – Understand Business IT Systems
Electronic Payment Security Technologies
Dept. of Business Administration
COMPLETE BUSINESS TEXTING SOLUTION
Training Module 2 V1.1 Training Module 1 V1.9 9/4/2019
The Future Secure GSM Workshop CIS Division NATO C3 Agency
Product Overview.
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Personal Mobile Device Acceptable Use Policy Training Slideshow
Security in Wide Area Networks
Cellular Telephone Networks
The Physical Layer Chapters
Presentation transcript:

NSK 200 Secure Phone System KDC - Crypto Department - NC3A June 18, 2002

NSK 200 Secure Telephone System Basics principles & technology Product Range Different schemes and operation modes Key Management How to use Communications modes Encrypted File Transfer Customers Prices The connection between two base stations is plain text. No encryption is done here. The connection between a mobile phone and the base station can be encrypted, but doesn’t have to be. But...even if it IS encrypted, this encryption is very weak and you can even buy equipment from internet webshops to decrypt phonecalls done over the GSM network. If the network provider does encrypt this connection, he might even turn this encryption off at any time. What NSK 200 provides is _ end to end crypto _ ... Voice and data is encrypted in the phone and not decrypted before it reaches the other phone. 3. For key management we also have a Security Management Center...this is an option. 22/09/2018

Basics Principles & Technology The GSM system provides built-in encryption but: Only parts of the communication channel are encrypted The network operator may disable even this encryption The GSM crypto algorithm is cracked Intercepting equipment is commercially available The connection between two base stations is plain text. No encryption is done here. The connection between a mobile phone and the base station can be encrypted, but doesn’t have to be. But...even if it IS encrypted, this encryption is very weak and you can even buy equipment from internet webshops to decrypt phonecalls done over the GSM network. If the network provider does encrypt this connection, he might even turn this encryption off at any time. What NSK 200 provides is _ end to end crypto _ ... Voice and data is encrypted in the phone and not decrypted before it reaches the other phone. 3. For key management we also have a Security Management Center...this is an option. 22/09/2018

Basics Principles & Technology ….. Makes use of existing infrastructure; GSM network, terrestrial network (PSTN), satellite systems. Ordinary subscriptions (Requires separate data number on the GSM subscription) Plain-text calls are made through the ordinary voice service Encrypted calls are made through the transparent data service Connectivity: GSM voice and data (Plain and encrypted) DECT voice and data (Plain and encrypted) Compatible with NERA WorldCommunicator satellite modem & NERA F77 The separate data number is required to be able to send encrypted. Plain-text calls are made to the ordinary voice number, whereas secure calls are made to the data number. This way, in your address book, you have 2 GSM phone numbers to each recepient – one plain-text and one secure. 22/09/2018

Basics Principles & Technology ….. Security: EINRIDE algorithm SECAN approved up to level ’NATO Secret’ Key Loading from smart card or EKD (Electronical Key Distribution) Battery lifetime: 72 hours stand-by time about 3 hours talk time Primary users: Military Officers Politicians Official administration Industry leaders The separate data number is required to be able to send encrypted. Plain-text calls are made to the ordinary voice number, whereas secure calls are made to the data number. This way, in your address book, you have 2 GSM phone numbers to each recepient – one plain-text and one secure. 22/09/2018

System Components – Product Range NSK 200 Secure Phone NSK 201 DECT Adapter NSK 250 Security Management Center NSK 210 Key Generation Center You can, as a project start-up, set up a system with only phones, and get keys on smartcards form NODECA in Norway. Most authorities would like their own KGC though, to completely in charge of the key system. SMC is very conveniant for systems with many phones, or when there are particular requirements regarding management. More details on the next page. 22/09/2018

System Components - Different Schemes You can, as a project start-up, set up a system with only phones, and get keys on smartcards form NODECA in Norway. Most authorities would like their own KGC though, to completely in charge of the key system. SMC is very conveniant for systems with many phones, or when there are particular requirements regarding management. More details on the next page. NSK 210 (Off-line) Key Generation Center. Where red keys are generated NSK 250 (On-line) Security Management Center. For central management of keys and configuration. 22/09/2018

Key Management – Two Possible Modes With NSK 250 Security Management Center Centralised client management Remote deletion of keys Automatic key and phone book distribution Handles up to 10.000 phones and 1000 key requests per hour Without NSK 250 – the Group Key mode The phone has two key-modes. SMC and Group key mode. Keys and phones are easily managed from the smc. The SMC will also syncronize the clocks on all phones every time they connect to it. Lets say your number of phones exceeds 50...I would recommend using an SMC. Manual key management All phones within one group uses same key Conveniant for administration of a small number of phones 22/09/2018

Any client is given one NSK200 handset and one smart card. How To Use? Any client is given one NSK200 handset and one smart card. These two objects should be kept apart. Typically, the smart card is stored in the wallet. Every time the phone is turned on, the smart card is inserted for client authentication Otherwise, the phone is operated like any other GSM or DECT phone 22/09/2018

Communication Modes GSM DECT Satellite Dual band 900/ 1800 The NSK 201 DECT Adapter is used to connect to the PSTN Encrypted calls are done using a modem integrated in the NSK 201 Satellite Compatible with the NERA terminals WorldCommunicator and F77 Connects through NSK 201 DECT Adapter and PSTN/ ISDN converter, but direct connectivity is being built into the WorldCommunicator NSK 201 Converter 22/09/2018

Encrypted File Transfer IrDA IrDA Encrypted file transfer 22/09/2018

Customers Norway Germany Luxembourg Holland Czech Republic NATO / NC3A Greece Turkey UK Spain Poland 22/09/2018

Need more information? Please, contact: Prices NSK200 – starts at NOK 43 000 / EUR 5 800 NSK201 – NOK 9 000 / EUR 1 200 NSK210 – NOK 120 000 / EUR 16 000 NSK250 – NOK 1 600 000 / EUR 214 000 Need more information? Please, contact: Kongsberg Defence Communications AS Ernst Bye ernst.bye@kdefence.com Tel: + 47 66 84 08 36 Mobile: +47 930 48 779 22/09/2018