Stealthphone Hard

← Back

Hardware encryptor

Stealthphone Hard

Stealthphone Hard

Stealthphone Hard is recommended for major corporations and state organizations.

Stealthphone Hard is a miniature encryption device designed to encrypt voice, SMS, e-mails and files. Stealthphone Hard has an internal 32 Gb SD-card which stores encrypted information.

Stealthphone Hard is connected to smartphones and tablets (Android, iOS, Windows Phone, Blackberry) via Bluetooth. Stealthphone Hard can also be connected to PC (Windows, MAC) via USB port or Bluetooth.

Stealthphone Hard runs on proprietary OS, designed by MTT, and supports TEMPEST standard.

Recommended smartphones

1.png 3D model view

Stealthphone Hard is recommended for large corporations, state organizations and individuals to provide the security of important information.

Stealthphone Hard is a hardware encryption device that can operate with mobile, satellite, analog phones, tablets and PCs.


Voice encryption with Stealthphone Hard:

  • Crypto Voice over GSM. Stealthphone Hard is connected to a mobile phone or a tablet via Bluetooth like a standard wireless headset. It doesn’t require any additional software to be set in a mobile phone (a tablet). Stealthphone Hard can operate without the Internet in this mode, standard voice GSM channel is enough for operation. 
    Crypto-voice-over-GSM.jpg
  • If you want to use a microphone suppression function, generating speech-like noise in a smartphone, additional software, available at MTT, should be installed on your smartphone.


  • Encryption of voice transmitted over analog and satellite phones. Stealthphone Hard is connected to an analog or a satellite phone via Bluetooth; additional software shouldn’t be downloaded in them.

  • Crypto Skype and Viber. Stealthphone Hard is connected to a mobile phone (a tablet) via Bluetooth. Voice is encrypted over an IP channel. Skype (Viber) servers are used to transmit encrypted speech.

  • Crypto Voice over IP. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled. A proprietary server of Mobile Trust Telecommunications is used to transmit encrypted speech.
    Voice-over-IP_eng.png

Data encryption with Stealthphone Hard:

  • SMS. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled. 


    SMS is dialed with a keypad of a Stealthphone Hard, which has its own cryptographic operating system, hackers cannot intercept your message, using viruses and a key loger.

  • Cryptochat and Cryptoconference (proprietary messenger of Mobile Trust Telecommunications): Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled, or Stealthphone Hard may be connected to a PC via USB. 


  • Crypto E-mail. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled, or Stealthphone Hard may be connected via USB to a PC where special Stealthphone application for Microsoft Outlook has been preinstalled.

  • Text and file encryption, as well as encryption of messages, sent over Facebook, LinkedIn, Twitter and mail servers, such as gmail, yahoo, etc. Stealthphone Hard is connected to a PC via USB.

  • PC data encryption. Special application Stealthphone CryptoDisk may be used for strong encryption of information stored in a PC, and a separate encrypted logical drive is created in a PC.
  • Encryption of data on the inner SD card. Stealthphone Hard provides the storage of up to 32 Gb of information on the inner SD card. Access to the functions and encryption requires a PIN-code. In order to use the SD card on a PC connect Stealthphone Hard via USB; then enter a PIN-code to receive access to files on the encrypted memory card, and the SD card will be displayed as a standard memory card.
The encryption device is implemented according to the TEMPEST standard. Running under the proprietary operating system of Мobile Trust Telecommunications it ensures protection against malicious software.

Cryptographic characteristics

  • Symmetric encryption algorithm (MTT company’s development) with a key length of 256 bit  

  • Asymmetric encryption algorithm based on the elliptic curves with a key length of 384 bit  

  • Possibility of embedding additional encryption algorithms  

  • Embedded physical random number generator for creating crypto key  

  • A specialized crypto operational system managing the work of device 

  • Specialized software for key generation and recording to the device 

  • One-time session keys (are generated in the beginning of a session and are guaranteed to be erased at the end of the session) 

  • Calculating a session key for voice encryption using Diffie-Hellman method combined with full key matrix 

  • Protection against unauthorized access:  
      • Device – using a password from 8 to 20 digites
      • Bluetooth – using PIN code from 4 to 20 digites
      • Crypto SD card – using a password from 8 to 20 digites

  • Speed of encryption – 5 МBit/sec  

  • Authentication of subscribers in the mode of encryption of telephone conversation  

  • Protection against the attack “Man in the middle” (MITM) while voice encryption 

  • Control of wholeness of the transferred encrypted data  
     
  • Immunity to computer viruses 

  • Key erasing and blocking of crypto services in case the device is lost or stolen

Stealthphone Hard is compatible with all corporate solutions: Stealthphone Soft, Stealthphone SIP-server, Stealthphone License Server, Stealthphone Key and Stealthphone OfficeGate.

Display:

Screen type: colored OLED display, 256 colors

Diagonal: 2"

Resolution: 128*160

Keyboard:

Keyboard type: mechanical

Number of keys: 20 (12 keys to input numbers and symbols, 8 function keys)

Operating system:

Low-level OS, a proprietary OS developed by MTT company

Power:

Battery type: Li-Ion

Capacity: 1500 mAh 

Battery life:

    • Voice encryption mode — 360 minutes
    • SMS encryption mode (SMS, MMS and e-mails) — 380 minutes
    • Standby mode — 340 hours

Interfaces:

To connect to PC: USB (mini-USB)

To connect to mobile devices: Bluetooth 2.1 (KMBT007)

Processor:

Control processor: NXP LPC4337 Cortex-M4 200 MHz.

Crypto coprocessor: Texas instruments TMS320C5515 120 MHz

(Crypto coprocessor provides access to encryption keys, data encryption and decryption, processing of encrypted data in voice communication mode).

Memory:

    • SD card for storing encryption keys (4 GB micro SD-card).

      Only the crypto coprocessor can access the SD-card. It guarantees secure key storage. 
    • SD-card for data storage (32 GB micro SD-card).

Other features

    • Hardware random number generator FDK RPG100

      (It is connected to the crypto coprocessor to provide reliable random number generation, which is not subject to environmental influences and is necessary for the secure operation of encryption algorithms).

    • Hardware real-time clock RTC Maxim DS1342U+
    • Audio codec Texas instruments TLV320AIC3204

      (Provides input and output of voice signals processed by crypto coprocessor)
    • Hardware noise canceller BR262W30A103E1G

      (improves the quality of a voice signal).
    • Dimensions — 119 x 56 x 11 mm 
    • Weight — 129 g

Feature comparison between Stealthphone Hard developed by MTT AG and TopSec Mobile Rohde & Schwarz

TopSec Mobile

Stealthphone

Standard Bluetooth - version 2.0; supports operation with one mobile phone: it does not support the connection to a computer.

Standard Bluetooth - version 2.1 EDR; supports up to 5 connected mobile phones; supports the connection to a computer via USB.

Standby time is up to 100 hours

Standby time is up to 340 hours

Operation in voice encryption mode is up to 4 hours

Operation in voice encryption mode is 6 hours

The minimum data transfer speed required for operation is 9.6 Kbit / s

The minimum data transfer speed required
for operation is 9.6 Kbit / s

Transfer protocol - V.32, V.110, TCP/IP

Transfer protocol – TCP/IP

None

Full phone format keypad; the possibility to
assign 10 speed dial numbers.

Liquid Crystal Display monochrome

2" color OLED display, 128x160px resolution

The device is charged using a USB cable; a charger supplied with the device.

The device is charged using a USB cable; a charger supplied with the device.

Supported data transfer channels: 3G, EDGE, Wi-Fi

Supported data transfer channels: LTE, 3G, HSDPA,EDGE, Wi-Fi, WiMax.

Geolocation of servers: unknown

Geolocation of servers: Russia, USA, Germany, Singapore

None

Voice over GSM support

None

Passwords, and card PIN-codes can be stored in the device

None

Storage of a phonebook and a call log

Supported OS: iOS, Android

Supported OS: iOS, Android, BlackBerry, Windows Phone

Dimensions: 99 mm х 34 mm х 22 mm

Dimensions: 119 x 56 x 11 mm

Weight - 58 grams

Weight – 129 grams

Cryptographic characteristics

User authentication: false encrypted communication is impossible; effectively prevents hacker attacks; creates closed user groups

User authentication: false encrypted communication is impossible;
effectively prevents hacker attacks; creates closed user groups

Symmetric encryption algorithm with a 256 bit encryption key

Symmetric encryption algorithm (developed by MTT) with a 256 bit encryption key

Voice encryption

Encryption of voice, SMS, MMS, E-Mail, “crypto chat” and “cryptoconference” modes (secure chat for two or more users)

No SD-card

A 32GB SD-card is used for storage of encrypted information. The recording Speed in the encryption mode is at least 200 MByte/sec; it can be
 used in an encryption mode with a password and in the normal mode without a password and access to previously encrypted data.

None

A mobile phone microphone is secured against unauthorized activation

None

Own mail server

None

Access codes can be dialed from an encryption device keypad

None

Unauthorized access is prevented by means of a password system used to start the device itself, Bluetooth and a crypto SD-card.

User authentication in the phone call encryption mode.

User authentication in the phone call encryption mode.

Voice encryption prevents Man-in-the-middle (MITM) attacks

Voice encryption prevents Man-in-the-middle (MITM) attacks

None

Secure IPSec protocol is used in a tunnel mode to provide the connection with a specialized SIP-server.

None

Key destruction and locking cryptographic services in case
the device is lost or stolen.

None

The «Stealthphone Software» emulator for mobile phones provides the security of
subscribers’ confidential information.

None

The device is connected to a computer via a USB port. Encryption of E-mail sent between computers, between computers
 and mobile phones.

None

Prevents unauthorized switching of mobile phone microphones.

Key system

Asymmetric encryption algorithm, based on elliptic curves, with a 384 bit key length.

Asymmetric encryption algorithm, based on elliptic curves, with a 256 bit key length.

Symmetric voice encryption algorithm with a 256 bit key length.

Symmetric voice encryption algorithm with a 256 bit key length

Session key computation is used to encrypt voice using the combination of the Diffie-Hellman method

Session key computation is used to encrypt voice using the combination of the Diffie-Hellman method and a secret long-term pairing key.

One-time session keys. (They are generated at the beginning of the session and are guaranteed to be deleted at the end of the session.)

One-time session keys. (They are generated at the beginning of the session and are guaranteed to be deleted at the end of the session.)

None

A one-time random session key is generated to encrypt data: SMS, MMS, E-Mail, using a full key matrix of up to 10000 users. A key matrix is generated by a software package using a physical random  number generator and software  audit of the statistic values.

None

10 security levels. Each level has its own key. The highest level can call the lower levels.

Have a question?

Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.

Submit question
Request training