A crypto card, this is part of your assurance of security
Enigma is one of only few secure mobiles to use a second, highly secure SIM card to store the signed digital key pair that are used to authenticate each user in a secure call. This SIM card is not only secure (many times more secure than your credit card), it actively protects the information stored within. Any unauthorised access of the card using scanning or mechanical techniques will result in the destruction of the card and the information stored on it. Not only are the keys guaranteed to be unique but the guarantee extends to the fact that there is no record kept of the keys programmed into each card, preserving anonymity. These SIM cards play a vital role in keeping the hackers away from your call.
Why is this important? This card forms the basis of the secure digital identity of the E2 unit and its user. It allows E2 units to authenticate each other making certain that you are secure.
Total Audio Separation
Each time you make an encrypted call the audio, both incoming and outgoing are physically switched away from the GSM part of the phone to the crypto module. This is also called Red/Black separation and is a requirement at governmental levels of security. This level of detail can only be found in a product that is specifically designed from the ground up to be secure.
Why is this important? This feature ensures that no unencrypted speech in either direction can be routed or transmitted anywhere other than the internal encryption processes.
Hardware Random Number Generator
The heart of any encryption is the process by which the encryption keys are created. With E2 the 256 bit session key is unique to EACH CALL that is made or received.
This key is created using a Hardware Random Number Generator which is at the core of the security process. This device is certified to 10 77 permutations which for the interested is a number that looks something like 1 followed by 77 zero’s…
100, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000,
This device is located on the crypto card and is not only protected by E2 but also by on-board active security. This really is different to any other product out there. This device produces a seed for the session key that is unique every time a call is made and discarded when the call is finished.
Why is this important? The Hardware Random Number Generator cannot be manipulated by any source either internal or more importantly external. It will always generate random keys that are unique, a crucial element in securing anything. Many pretenders will use software random number generators which can be manipulated by external sources as has been shown during the Snowden revelations.
Point to Point Communication
E2 is truly autonomous. All encryption is handled on the handsets without any need for external resource. The network provides only the communication link between each phone. Once authentication is successfully completed no attack on a conversation can be made without E2 detecting it.
Why is this important? External influences to a device, the call setup or the call itself can provide a weak point and can be attacked. This attack can form a back door to the device or at the very least the communication flow itself. Such an attack could prevent use of encryption services or compromise the conversation itself. This is not a danger in a hybrid solution such as E2.
Crystal Clear Speech
If users cannot recognise each other’s voice or pick up the nuances of language, they are not fully communicating. Voice quality is not just a critical development requirement for us, it is one of the primary measures by which we judge our products. Enigma uses one of the finest voice codecs available, CrystalSpeech®. When this is coupled with our voice encryption process, the result is encrypted speech at a quality that surpasses what is considered acceptable in modern mobile phones. Time and again users comment on the clarity of speech - yet another feature that puts Enigma ahead of the field.
Why is this important? You should be comfortable using a product. Also the best security is one that you naturally recognise. Recognising a person’s voice at the other end of the call means you are talking to the correct person. E2 will make sure that nobody else is listening.
So simple to use, but so secure
There is little point in having a secure system that is complicated to use; it will not be used. Much time has been taken to ensure that E2 is simple to use. So, from the point that you enter the number and press the crypto key the process is completely automatic. Approximately seven seconds after pressing the crypto button you should be talking to the other party and at that point you will be assured of two things. You know exactly who you are talking to and that no one else is listening.
Why is this important? Again, you should be comfortable using a product. It should not confuse or frustrate.
Hybrid in this context means that encrypted services on E2 are provided by a fusion of purpose designed hardware and software as opposed to a software application. E2 is a purpose designed security device. Powerful hardware controls and manages the encryption processes, generate the random numbers used to seed the encryption keys, store the certificates used to authenticate each unit in the call, protecting the complete audio path from external attack amongst many other features.
Why is this important? All other products are either software only or apps added to a standard phone. Without closely integrating hardware and software these can never be as secure as a hybrid solution. The hardware software combination cannot be breached or modified by any external source. E2 provides you with the very best levels of security possible.
Tripleton Secure Products, a brand of excellence from IntSec.
Who are we?
IntSec has, for over sixteen years, from our offices in the United Kingdom, developed and produced some of the most secure mobile products there are. Tripleton secure systems have become the devices of choice for many different types of clients ranging from individuals to governments around the world. Each user needs absolute confidence in the security as well as the reliability of these products. This confidence can be shared by all, no matter their application or industry. We constantly fulfil our obligation to our users to secure their voice data and messaging across the globe.
The IntSec development group behind our products are some of the most leading edge companies in the world, all of us committed to your security. E2 is the latest in a development programme that will bring our unique secure processes together with 3G and 4G technologies. This will ensure future proof compatibility across all networks across the globe. Our products are marketed and supported by resellers in many countries.