Stealthphone Hard
Hardware encryptor
Stealthphone Hard
-
Stealthphone Hard is recommended for major corporations and state organizations.
Stealthphone Hard is a miniature encryption device designed to encrypt voice, SMS, e-mails and files. Stealthphone Hard has an internal 32 Gb SD-card which stores encrypted information.
Stealthphone Hard is connected to smartphones and tablets (Android, iOS, Windows Phone, Blackberry) via Bluetooth. Stealthphone Hard can also be connected to PC (Windows, MAC) via USB port or Bluetooth.
Stealthphone Hard runs on proprietary OS, designed by MTT, and supports TEMPEST standard.
3D model view
Stealthphone Hard is recommended for large corporations, state organizations and individuals to provide the security of important information.
Voice encryption with Stealthphone Hard:
- Crypto Voice over GSM. Stealthphone Hard is connected to a mobile phone or a tablet via Bluetooth like a standard wireless headset. It doesn’t require any additional software to be set in a mobile phone (a tablet). Stealthphone Hard can operate without the Internet in this mode, standard voice GSM channel is enough for operation.
-
If you want to use a microphone suppression function, generating speech-like noise in a smartphone, additional software, available at MTT, should be installed on your smartphone.
- Encryption of voice transmitted over analog and satellite phones. Stealthphone Hard is connected to an analog or a satellite phone via Bluetooth; additional software shouldn’t be downloaded in them.
- Crypto Skype and Viber. Stealthphone Hard is connected to a mobile phone (a tablet) via Bluetooth. Voice is encrypted over an IP channel. Skype (Viber) servers are used to transmit encrypted speech.
- Crypto Voice over IP. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled. A proprietary server of Mobile Trust Telecommunications is used to transmit encrypted speech.
Data encryption with Stealthphone Hard:
- SMS. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled.
SMS is dialed with a keypad of a Stealthphone Hard, which has its own cryptographic operating system, hackers cannot intercept your message, using viruses and a key loger. -
Cryptochat and Cryptoconference (proprietary messenger of Mobile Trust Telecommunications): Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled, or Stealthphone Hard may be connected to a PC via USB.
- Crypto E-mail. Stealthphone Hard is connected via Bluetooth to a mobile phone (a tablet) where special software Stealthphone Sec has been preinstalled, or Stealthphone Hard may be connected via USB to a PC where special Stealthphone application for Microsoft Outlook has been preinstalled.
- Text and file encryption, as well as encryption of messages, sent over Facebook, LinkedIn, Twitter and mail servers, such as gmail, yahoo, etc. Stealthphone Hard is connected to a PC via USB.
- PC data encryption. Special application Stealthphone CryptoDisk may be used for strong encryption of information stored in a PC, and a separate encrypted logical drive is created in a PC.
- Encryption of data on the inner SD card. Stealthphone Hard provides the storage of up to 32 Gb of information on the inner SD card. Access to the functions and encryption requires a PIN-code. In order to use the SD card on a PC connect Stealthphone Hard via USB; then enter a PIN-code to receive access to files on the encrypted memory card, and the SD card will be displayed as a standard memory card.
Cryptographic characteristics
- Symmetric encryption algorithm (MTT company’s development) with a key length of 256 bit
- Asymmetric encryption algorithm based on the elliptic curves with a key length of 384 bit
- Possibility of embedding additional encryption algorithms
- Embedded physical random number generator for creating crypto key
- A specialized crypto operational system managing the work of device
- Specialized software for key generation and recording to the device
- One-time session keys (are generated in the beginning of a session and are guaranteed to be erased at the end of the session)
- Calculating a session key for voice encryption using Diffie-Hellman method combined with full key matrix
- Protection against unauthorized access:
- Device – using a password from 8 to 20 digites
- Bluetooth – using PIN code from 4 to 20 digites
- Crypto SD card – using a password from 8 to 20 digites
- Speed of encryption – 5 МBit/sec
- Authentication of subscribers in the mode of encryption of telephone conversation
- Protection against the attack “Man in the middle” (MITM) while voice encryption
- Control of wholeness of the transferred encrypted data
- Immunity to computer viruses
- Key erasing and blocking of crypto services in case the device is lost or stolen
Stealthphone Hard is compatible with all corporate solutions: Stealthphone Soft, Stealthphone SIP-server, Stealthphone License Server, Stealthphone Key and Stealthphone OfficeGate.
Display:
Screen type: colored OLED display, 256 colors
Diagonal: 2"
Resolution: 128*160
Keyboard:
Keyboard type: mechanical
Number of keys: 20 (12 keys to input numbers and symbols, 8 function keys)
Operating system:
Low-level OS, a proprietary OS developed by MTT company
Power:
Battery type: Li-Ion
Capacity: 1500 mAh
Battery life:
- Voice encryption mode — 360 minutes
- SMS encryption mode (SMS, MMS and e-mails) — 380 minutes
- Standby mode — 340 hours
Interfaces:
To connect to PC: USB (mini-USB)
To connect to mobile devices: Bluetooth 2.1 (KMBT007)
Processor:
Control processor: NXP LPC4337 Cortex-M4 200 MHz.
Crypto coprocessor: Texas instruments TMS320C5515 120 MHz
(Crypto coprocessor provides access to encryption keys, data encryption and decryption, processing of encrypted data in voice communication mode).
Memory:
- SD card for storing encryption keys (4 GB micro SD-card).
Only the crypto coprocessor can access the SD-card. It guarantees secure key storage. - SD-card for data storage (32 GB micro SD-card).
Other features
- Hardware random number generator FDK RPG100
(It is connected to the crypto coprocessor to provide reliable random number generation, which is not subject to environmental influences and is necessary for the secure operation of encryption algorithms).
- Hardware real-time clock RTC Maxim DS1342U+
- Audio codec Texas instruments TLV320AIC3204
(Provides input and output of voice signals processed by crypto coprocessor) - Hardware noise canceller BR262W30A103E1G
(improves the quality of a voice signal). - Dimensions — 119 x 56 x 11 mm
- Weight — 129 g
Feature comparison between Stealthphone Hard developed by MTT AG and TopSec Mobile Rohde & Schwarz
| |
TopSec Mobile |
Stealthphone |
Standard Bluetooth - version 2.0; supports operation with one mobile phone: it does not support the connection to a computer. |
Standard Bluetooth - version 2.1 EDR; supports up to 5 connected mobile phones; supports the connection to a computer via USB. |
Standby time is up to 100 hours |
Standby time is up to 340 hours |
Operation in voice encryption mode is up to 4 hours |
Operation in voice encryption mode is 6 hours |
The minimum data transfer speed required for operation is 9.6 Kbit / s |
The minimum data transfer speed required
|
Transfer protocol - V.32, V.110, TCP/IP |
Transfer protocol – TCP/IP |
None |
Full phone format keypad; the possibility to
|
Liquid Crystal Display monochrome |
2" color OLED display, 128x160px resolution |
The device is charged using a USB cable; a charger supplied with the device. |
The device is charged using a USB cable; a charger supplied with the device. |
Supported data transfer channels: 3G, EDGE, Wi-Fi |
Supported data transfer channels: LTE, 3G, HSDPA,EDGE, Wi-Fi, WiMax. |
Geolocation of servers: unknown |
Geolocation of servers: Russia, USA, Germany, Singapore |
None |
Voice over GSM support |
None |
Passwords, and card PIN-codes can be stored in the device |
None |
Storage of a phonebook and a call log |
Supported OS: iOS, Android |
Supported OS: iOS, Android, BlackBerry, Windows Phone |
Dimensions: 99 mm х 34 mm х 22 mm |
Dimensions: 119 x 56 x 11 mm |
Weight - 58 grams |
Weight – 129 grams |
Cryptographic characteristics | |
User authentication: false encrypted communication is impossible; effectively prevents hacker attacks; creates closed user groups |
User authentication: false encrypted communication is impossible;
|
Symmetric encryption algorithm with a 256 bit encryption key |
Symmetric encryption algorithm (developed by MTT) with a 256 bit encryption key |
Voice encryption |
Encryption of voice, SMS, MMS, E-Mail, “crypto chat” and “cryptoconference” modes (secure chat for two or more users) |
No SD-card |
A 32GB SD-card is used for storage of encrypted information. The recording Speed in the encryption mode is at least 200 MByte/sec; it can be
|
None |
A mobile phone microphone is secured against unauthorized activation |
None |
Own mail server |
None |
Access codes can be dialed from an encryption device keypad |
None |
Unauthorized access is prevented by means of a password system used to start the device itself, Bluetooth and a crypto SD-card. |
User authentication in the phone call encryption mode. |
User authentication in the phone call encryption mode. |
Voice encryption prevents Man-in-the-middle (MITM) attacks |
Voice encryption prevents Man-in-the-middle (MITM) attacks |
None |
Secure IPSec protocol is used in a tunnel mode to provide the connection with a specialized SIP-server. |
None |
Key destruction and locking cryptographic services in case
|
None |
The «Stealthphone Software» emulator for mobile phones provides the security of
|
None |
The device is connected to a computer via a USB port. Encryption of E-mail sent between computers, between computers
|
None |
Prevents unauthorized switching of mobile phone microphones. |
Key system | |
Asymmetric encryption algorithm, based on elliptic curves, with a 384 bit key length. |
Asymmetric encryption algorithm, based on elliptic curves, with a 256 bit key length. |
Symmetric voice encryption algorithm with a 256 bit key length. |
Symmetric voice encryption algorithm with a 256 bit key length |
Session key computation is used to encrypt voice using the combination of the Diffie-Hellman method |
Session key computation is used to encrypt voice using the combination of the Diffie-Hellman method and a secret long-term pairing key. |
One-time session keys. (They are generated at the beginning of the session and are guaranteed to be deleted at the end of the session.) |
One-time session keys. (They are generated at the beginning of the session and are guaranteed to be deleted at the end of the session.) |
None |
A one-time random session key is generated to encrypt data: SMS, MMS, E-Mail, using a full key matrix of up to 10000 users. A key matrix is generated by a software package using a physical random number generator and software audit of the statistic values. |
None |
10 security levels. Each level has its own key. The highest level can call the lower levels. |
Have a question?
Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.