Our technologies

Cryptographic algorithms

Encryption algorithm

The encryption algorithm is a strong 256 bit symmetric encryption algorithm Tiger, a proprietary MTT design.

Tiger is a synchronous additive stream cipher. Synchronization is provided by an initialization vector, transmitted (or stored) in an open form together with the ciphertext. The length of the initialization vector ranges from 4 to 12 bytes, depending on the scenario used.

The encryption device should first be initialized to enable it. The initialization procedure requires a secret key and an initialization vector to commence. The initialization outputs the values of all status elements of the encryption device.

Learn more about our Encryption Algorithms

Learn more about our Symmetric Encryption Algorithms

Learn more about our Asymmetric Encryption Algorithms

Learn more about Hardware Encryption System for E-Commerce and Mobile Banking Security

Maintaining data integrity

Algorithms, providing the data integrity test, are needed to protect data (stored in the encryption device, a smartphone or a PC or encrypted data exchanged by the subscribers) against accidental or intentional distortion.

Data authentication is executed by computation of the one-way function, data and the secret key should be input to the function. The calculation result of the one-way function, also called “data authentication code” (or “message authentication code”) is stored or transmitted together with the data. Any data alteration causes the alteration of the authentication code. It is impossible to match it without the secret key, even if the one-way function properties are selected correctly.

HMAC-SHA256 algorithm is used in Stealthphone and StealthTell systems as a basic algorithm for computing of a data authentication code.

The data authentication code is computed and checked in all the solutions for all types of encrypted data: voice, SMS, instant messages, E-mails and all types of files and multimedia information transmitted or stored in the protected memory of the encryption device, a smartphone, a PC or an SD-card.

All encrypted data undergoes an integrity check.

Learn more about Authentication, Integrity And Non-Repudiation

Computations in the cluster of points of the elliptic curve to authenticate the subscribers and negotiate session keys

Asymmetric cryptographic elliptic curve-based algorithms (ECC) are used in common key agreement protocols to encrypt voice in Stealthphone and StealthTell systems and also in subscriber authentication protocols of the StealthTell system.

The cryptographic security of the elliptic curve-based systems, is founded on the Elliptic Curve Discrete Logarithm Problem (ECDLP).

The complexity of the best currently used ECDLP algorithms is exponential, whereas the running time of such tasks as the factoring whole numbers and logarithmation in finite fields (they are the basis of the alternative algorithms RSA and El-Gamal) is sub-exponential.

It means that the required security level in elliptic curve systems is achieved with shorter key length, compared to the RSA system for example. For comparison, a 384-bit ECC key provides the same security level as a 7680-bit RSA key. The shorter key length in EEC, compared to the alternative variants, allows accomplishing high-tech solutions. In fact, while the crypto security level is the same, it is possible to achieve the substantial increase of the computation speed and reduce the volume of transmitted data.

The National Security Agency of the USA has approved the use of asymmetric cryptographic algorithms based on elliptic curves (with 384 bit key length) to process top secret documents.

384-bit elliptic curves are also used in Stealthphone and StealthTell systems. The cryptographic security of the cryptosystems based on ECC is based not only on the elliptic curve length, but also on the mathematical parameters of the elliptic curve cluster points, where computations are performed.

The parameters of a group of the elliptic curve cluster points, where the computation is accomplished in Stealthphone and StealthTell systems, entirely provide the required cryptographic characteristics.

Cryptographic algorithms for Voice over GSM Encryption

Strong time-frequency transformation of voice is used to protect voice transmitted over GSM channels. This transformation is resistant to double vocoder transformation.

The main transformation elements are:

  • Splitting a voice signal into linear elements
  • Non-linear transformation of linear elements
  • Interchange of voice elements
  • Processing of the incoming signal to transmit over the AMR voice codec and a GSM channel

The transformation parameters (the number and the length of voice signal elements) depend on the key.

Non-linear parameters are also defined by the cryptographic key.

The total algorithmic and system delay (caused by the cellular network) does not exceed 2.5 seconds.

Download this PDF to learn more about strength of cryptographic transformations.

Voice encryption algorithms for IP telephony software

When IP telephony applications are utilized, including Skype and Viber, guaranteed security time-frequency transformation of the voice signal provides the protection of voice information and converts the speech into a noise-like signal.

The transformation consists of:

  • N-filter comb (a filter bank)
  • Dispersive delay line (a filter with random phase-frequency characteristics)
  • N length substitution

The transformation properties (the number of filters, the delay line parameters) depend on the key.

The repositioning of the spectral bands in a filter comb is set by the session key once the connection is established.

The bands are rearranged once every 3-5 seconds to execute a dynamic transformation.

The algorithmic time delay does not exceed 1 second. The band of the processed voice signal is 300-3400 hz. The minimum length of N substitution is 24.

There may be several transformations depending on the traffic capacity of Internet connection. The permitted extreme delay is 2 seconds. If Internet connection is slow or unstable, an algorithm, that does not require synchronization, may be used. It provides quick handshaking and stable cryptographic connection.

The potential vulnerability of the static transformation is balanced out by the forceful limitation of the connection time and reconnection using new session keys.

Key management

When it comes to the creation of cryptographic information security systems, keys management is one of the most challenging tasks of the applied cryptography. According to our estimations, the vulnerabilities in some elements of the key management system (generation, storage, usage, distribution and protocol exchange protocols) are the principal causes of ISS compromise.

That is why the key management lifecycle is the subject of particular attention in Stealthphone and StealthTell systems – from key generation to key deletion or key change.

The most important key management issues are described below.

Key Quality Control

When keys are generated by software (Stealthphone Hard, Stealthphone Key Hard) or hardware means (Stealthphone Soft, StealthTell, Stealthphone Key) the key quality is constantly controlled to check their statistic parameters and detect the presence of patterns.

Hardware generators use random number generators based on physical processes. Their characteristics have been scientifically confirmed by special laboratory testing.

Software generators are designed according to the constant entropy accumulation principle – an actual random sequence – and its further use to generate encryption keys.

Various events in a smartphone, a tablet or a PC may be the entropy source.

Character input when the text is entered is an example of the event. If the key generation system considers the volume of the initial entropy to be insufficient, a user may be advised to perform some manipulations with the device to complete it.

The entropy accumulation procedures executed in software key generators have been thoroughly tested and confirmed their excellent characteristics.

In all types of key generation the generated keys undergo various procedures to execute the dynamic control of their statistic characteristics.

Key storage

All keys (including those stored in Stealthphone Hard encryption device) are stored in the encrypted form or are not stored anywhere. They are generated “on the fly” from a password and some additional data.

The decryption of encrypted keys is performed only when they are used for encryption. They are in the decrypted form while the operation is in process. They may also be masked and securely stored in the device memory.

Key Classification

Though there are differences of principle between the architecture of Stealthphone and StealthTell key systems, they are based on the common key classification principles, clearly governing key usage rules:

  • All keys are subdivided into two types – data encryption keys and key encryption keys. It means that each encryption key is used either to encrypt data (including voice) or exclusively to encrypt keys, in particular those, which are used to encrypt data and voice
  • All keys are subdivided into long-term keys and one-time keys. Long-term keys are repeatedly used within a certain period of time; one-time keys are used only once to encrypt a data fragment or a voice fragment. Long-term keys include all key encryption keys, and also data encryption keys in a smartphone or a PC. Scheduled and unscheduled substitution procedures are set forth for long-term keys, in case they are lost or compromised
  • All encryption keys may be arranged in an certain hierarchy: 
    • There is an authentication key at the very top of it. It is not stored anywhere and is generated as a result of the subscriber authentication by the device according to the password 
    • Next there is a master-key, encrypted with the help of the authentication key. The master-key is used to encrypt: 
      • all key encryption keys used to encrypt data
      • all data encryption keys stored in a Stealthphone Hard, a smartphone, a tablet or a PC.  
    • The next level includes key encryption keys, used to encrypt data. These keys are encrypted by the master key and are used to encrypt one-time data encryption keys and keys used to generate session keys for voice encryption.                     
    • The lower level is presented by the keys, used to encrypt data. Each data encryption key is encrypted
  • Only one-time session encryption keys are used to encrypt voice. They are deleted at the end of the conversation. The volume of voice data, encrypted with the help of a one-time session key, is limited 
  • Only one-time keys are used to encrypt transmitted data; the volume of data, encrypted with the help of a one-time key, is limited

Specific Features of Stealthphone Key System

The secure exchange of encrypted data in the Stealthphone system is possible only within one cryptographic network (Stealthphone network). The subscribers of the network can exchange the following four types of encrypted data:

  • Voice data (voice encryption)
  • SMS messages
  • E-mail messages
  • Text messages and files (messenger)

A session key is used to encrypt voice. A session keys is generated by combination of the key, generated with the help of ECDH method, and a pairing connection secret key, used to encrypt voice and shared by two subscribers.

The other three types of data – SMS messages, E-mail messages and text messages - are encrypted by one-time keys, randomly and equiprobably generated at the transmitting side. In order for the receiving side to decrypt the data, the one-time key and the data are encrypted by Tiger asymmetric algorithm and sent together with the encrypted data. The one-time keys are encrypted with the secret pairwise key, belonging to both subscribers.

Therefore, each pair of subscribers within one crypto network shares a set of four different pair communication keys, each set serving one type of data encryption.

A pairwise voice encryption key is utilized in the procedure to generate a session key to encrypt voice.

A pairwise SMS key is used to encrypt one-time keys, used to encrypt SMS messages.

Pairwise Email and messenger keys are used the same way as a one-time pair-wise SMS key to encrypt e-mails and files sent over the messenger.

The total number of pairwise keys for each subscriber, used to exchange encrypted information with the other network subscribers, is 4 × (N – 1), where N is a number of network subscribers.

Pairwise voice encryption keys of all Stealthphone network subscribers can be arranged in one N × N square table (matrix) according to the following rule:

  • Matrix diagonal is unfilled (contains zero elements)
  • There is a secret pairwise key, used to encrypt voice data of subscribers A and B, at the intersection of line A and column B

The same approach can be used to create pairwise key matrices for the other types of data. All four matrices are symmetric about the diagonal.

If we combine four matrices we’ll get a full pairwise key matrix, symmetric about the diagonal, of the Stealthphone network. It will contain all the pairwise keys, which each pair of Stealthphone network subscribers will require to securely exchange all types of data. At the intersection of line A and column B there is a full set of 4 secret pairwise keys for the subscribers with cryptonumbers A and B.

Number A matrix line forms a set of all pairwise keys required for the exchange of encrypted data between the subscriber with cryptonumber A and the other network subscribers. The total number of keys in the line is equal to 4 × (N – 1).

The pairwise key matrix of the Stealthphone network and all the other subscribers’ keys are generated by the network administrator with the help of a StealthKey complex. StealthKey complex is used to download keys into subscribers’ devices at the administrator’s work station. A subscriber can also upload the keys himself, using a PC and the key set, prepared in advance by the administrator.

In order to maintain the maximum security level and to streamline the key management in the Stealthphone network, it provides the possibility of the initial one-time key uploading into subscribers’ devices. There is no need to reupload the keys, if the network structure changes (subscribers’ access rights are terminated/added/changed), or in case the keys of the other subscribers are compromised, or there’s a scheduled change of all keys of the network subscribers.

Thus the initial key uploading into subscribers’ devices may be enough for a few years and there will be no need to reload the keys.

Methods for Protection against Dangerous Electromagnetic Emissions (TEMPEST Standard)

The problem of studying linear and other electric circuits of the cryptographic equipment is called forth by available principle possibility to restore keys or non-ciphered (clear) information as a result of intercept of its microtrace generated at the time of processing the above mentioned information in the components of the equipment. The subject of special examination also includes electromagnetic fields, channel circuits and outcoming wiring of the equipment in which researchers can find trace of key and clear information caused by the functioning of the internal components of the cryptographic equipment.

For example, let's consider the output signal of the electronic cryptographic equipment – sequence of pulses representing abstract zeros and ones. In any electronic equipment such pulses are to comply with some standards so that they can be identified by the other parts of the system. In cryptography there are some additional requirements: pulses representing identical values must be identical as much as possible.

Cryptographic equipment, like any other devices, is typical of electromagnetic emission caused by short pulses use. As any emission of a cryptographic device can be intercepted by adversaries and analyzed for obtaining useful information, there must be provided a protection against such attack, for example, by way of shielding units and blocks of the equipment. The first stage of shielding is intended to divide strictly the device into "red" (restricted) zone within which there is a plain text, and "black" (unrestricted) zone, within which there is only a ciphertext. The device must be designed so that all traffic lines between "red" and "black" zones be protected to provide passage of only designated information via them.

The adversary can organize an active attack, directing emission of high energy at a communication terminal and monitoring the reaction, expecting to obtain any information on its internal state.

The general attitude to estimating an extent of cryptographic equipment protection consists in selecting (on the basis of the analysis of proposed circuit designs) sources of dangerous signals, discovering, by experimental methods, among them the most informative ones and measuring the levels of dangerous signals from the selected sources through the leakage paths. Then a degree of informativeness is determined by calculating the signal-to-noise ratio at the output of the receiver under the conditions of operating masking noise and comparing the obtained data with the accepted values.

Learn more about our Methods for Protection against Dangerous Electromagnetic Emissions (TEMPEST Standard)


The principle of steganographic methods of information protection is that a violator cannot distinguish meaningful information in the stream of data circulating in the system. Therefore, in this case no issue on possible access to protected information exists at all, because
it is absolutely unclear what data should be distinguish as meaningful. It is generally agreed that the basic requirements for steganographic systems are as

  • steganographic methods must ensure authenticity and integrity of files; 

  • an enemy possesses complete knowledge of steganographic methods; 

  • steganographic methods must retain principal properties of a file transmitted in clear mode (a stegocontainer) when a confidential message and certain service data unknown to the enemy, for example a key, are entered into such file

  • if an enemy knows about transmission of a certain hidden message, an extraction of the confidential message out of the stegocontainer must represent a complex computational problem. 
There are several ways the steganography can be used. They differ principally by the type of containers – those files or messages in which confidential information is built. Graphic and sound containers are traditionally used. Their inherent redundancy allows an additional informational component to be included without detection of its masking container. Considering the fact that current information and telecommunication technologies are digital, the most
effective approach seems to be the one that uses the least significant bits of digitized images or acoustic signals as components carrying useful information.

Learn more about Steganography