Stealthphone Soft

← Back

Stealthphone Soft

Stealthphone Soft

Stealthphone Soft

Stealthphone Soft is recommended for small and medium enterprises.

Stealthphone Soft encrypts voice, e-mails, SMS and files.

Symmetric and asymmetric algorithms are used to run all the encryption processes (see more in Stealthphone Soft description). Stealthphone network administrator uses Stealthphone Key to generate and distribute encryption keys. Even if the subscriber’s smartphone is lost or stolen, it will not compromise Stealthphone network.

Stealthphone Soft runs on Android, iOS, BlackBerry, WP 8.1.

Recommended phones

Description

Stealthphone Soft is a mobile app for iOS, Android, Windows Phone and Blackberry devices (smartphones and tablets). Stealthphone Soft allows the users to encrypt voice, e-mail, SMS and also to exchange encrypted files within Stealthphone network. Stealthphone Soft protects subscribers from interception, tampering or faking of their information.

Stealthphone Soft is an easy-to-use solution for encrypted communication throughout the world.

  • Encryption of phone calls 

    Stealthphone Soft encrypts voice in real time seamlessly and with no delays. Your smartphone must be connected to the Internet (EDGE, 3G, 4G/LTE, Wi-Fi).

  • SMS encryption 

    SIM card is required for exchange of encrypted messages among subscribers within one Stealthphone network. Only Android and Blackberry devices support exchange of encrypted SMS.

  • Encrypted notebook 

    Stealthphone Soft stores user’s notebook data in internal memory of the smartphone in encrypted form.

  • Cryptomessenger 

    Exchange of instant messages and all types of files among the subscribers within one Stealthphone network. It is also possible to create group chats. Internet connection is required (EDGE, 3G, 4G/LTE, Wi-Fi).

  • Encrypted e-mail client 

    Exchange of encrypted e-mail and attachments (all types of files) among subscribers within one Stealthphone network. Your smartphone must be connected to the Internet (EDGE, 3G, 4G/LTE, Wi-Fi).

  • Encryption of files 

    Encryption of files in internal memory of a smartphone/tablet. You can also store encrypted files on SD card.

  • Support of popular mobile platforms: iOS, Android, Windows Mobile и Blackberry

  • Fully compatible with Stealthphone Hard


Important! To conduct secure calls or exchange encrypted information, both subscribers are required to:

  • have Stealthphone Hard or Stealthphone Soft
  • remain in the same Stealthphone network.


Compatibility:

Stealthphone Soft is compatible with all corporate solutions: Stealthphone Hard, Stealthphone SIP-server, Stealthphone license server, Stealthphone Key and Stealthphone OfficeGate.

Cryptographic characteristics

  • Strong symmetrical encryption algorithm with key length of 256 bit (designed by MTT company)

  • Combined method for calculation of session key. The method is based on Diffie-Hellman elliptic curves and full key matrix

  • After the call is over the one-time keys are deleted

  • One-time keys are used for encryption of SMS, files, e-mails, attachments and files sent over cryptomessenger

  • Authentication of subscribers before starting a secure phone call, protection against Man-in-the-Middle (MITM) attacks

  • HMAC-SHA-256 algorithm is used to authenticate the encrypted data

  • Protection against unauthorized access in case of theft/loss

Feature comparison of Stealthphone Soft developed by MTT and the competing products

MTT AG has developed Stealthphone Soft - software to encrypt voice, SMS, MMS, E-mail for Android, BlackBerry, iOS and Windows operating systems, used on mobile devices.

The table below provides the overview on the study of Stealthphone Soft, AdeyaGate, Kryptos, GoldLock 3G, Cellcrypt Mobile, CrypToGo, Secure Voiсe 3G and Phone Crypt Mobile features.

Comparison criteria

  Stealthphone Soft  

  Adeya Gate  

 Kryptos 

 GoldLock 

 Cellcrypt Mobile

 CrypToGo 

 Secure Voiсe 

 PhoneCrypt Mobile 

Voice encryption

+

+

+

+

+

-

+

+

SMS encryption

+

+

-

+

-

+

-

-

ММS encryption

+

-

-

-

-

-

-

-

E-Mail encryption

+

+

+

-

-

-

-

-

Crypto chat / Crypto conference

+

-

-

+

+

-

-

-

Crypto notes

+

-

-

-

-

-

-

-

Software encryption and key storage in a phone

+

+

+

+

+

+

+

+

Symmetric encryption algorithms are used

In-house design is used

AES 256-bit

AES 256 bit

AES 256- bit

AES 256 bit,
RC4 256 bit

AES 256 bit

AES 256 bit

AES 256 bit

Asymmetric encryption algorithms are used

Diffie-Hellman 4096 bit

RSA 2048 bit

RSA 2048 bit

Diffie-Hellman 4096 bit,
Elliptic Curve 384 Bits

Diffie-Hellman 4096 bit,
RSA 2048 bit

RSA 2048 bit

Diffie-Hellman 4096 bit

Diffie-Hellman 4096 bit

Encrypted calls to standard stationary phones from a mobile phone to the server

-

+

-

-

+

-

-

-

The ability to create an account on own mail servers

+

-

-

-

-

-

-

-

The ability to use the mail account on third-party servers (gmail.com, yahoo.com, yandex.ru, etc.)

+

-

-

-

+

-

+

-

A user can independently generate and load keys (using a hardware or a software key generator)

+

-

-

-

-

-

-

-

Use of Android OS

+

+

+

+

+

+

+

+

Use of iOS

+

+

+

+

+

-

+

+

Use of BlackBerry OS

+

+

+

+

+

+

+

-

Use of Windows Phone

+

+

-

-

-

-

-

-

Have a question?

Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.

Submit question
Request training