Enigma E1

Totally Secure Voice Encryption

This was the original Tripleton secure mobile phone. Enigma E1 was released in 2001 and ended production late 2011.  Built & designed in close cooperation with T-Systems/T-TeleSec , the security division of Deutsche Telekom in Germany. The Tripleton™ Enigma provides strong end-to-end encryption for voice communication on the standard GSM networks using the raw data-service capabilities of the GSM network and state-of-the-art cryptographic technology. 

We are a well established mobile phone manufacturer. The hardware and software components of the Tripleton Enigma have been built to meet the most stringent government and military security requirements. 

All Enigma products can operate as a secure crypto phone or as a normal GSM mobile. In secure mode, it is possible to communicate with other Tripleton Enigma devices.


enigma 1The GSM Networks

The GSM system is a superb communication system all over the world. But It does have well-publicised weaknesses that make it inappropriate for exchanging confidential or sensitive information.

Conventional GSM calls can be monitored or infiltrated by readily available surveillance equipment. End-to-end security is not provided, nor is it possible to authenticate the individual with which you are in contact. Middle Man Attack from false base stations are a real threat, as is the cloning of SIM cards.

At the IEEE "Secure Mobile Communications Conference" in Sept 2005, it was announced that the cost of the equipment required to simulate a base station and intercept a conversation while relaying it to the intended party had dropped to under £5000. It is much cheaper today. Consequently, this ability is no longer confined to the budgets of governments and large organisations - Almost anyone could be listening.

Totally Secure Crypto Phone Comunications


Superb Speech Quality

Tripleton Enigma crypto phone eliminates these problems. The encryption system, designed by Tripleton™ in association with their cryptographic partners in Germany, has been verified in the field over many years. The system is designed to rigorous Common Criteria standards.

In addition, the phones all-important second SmartCard is totally tamper-proof, and the keys are guaranteed by our Certification Authority to be unique and secret.

For organisations whose security policy demands control of the key generation and distribution processes, we offer a Key Management System.

For organisations who wish to examine and/or verify the security of Tripleton Enigma for themselves, we offer a specialised Cryptographic Acceptance Testing service. If you require further details on either of these products, please Contact Us.

Simple To Use

To make a secure call with the Tripleton Enigma, all you have to do is dial the number and press the "Crypto" button. And since you can only make secure encrypted calls to other Tripleton Enigma devices orLineCrypt, the system is totally secure.
Tripleton Enigma will work on all GSM 1800/900 mobile communication networks. It has the hallmarks of a business mobile phone. When these are combined with an integrated encryption system it becomes the superior business tool. 
Tripleton Enigma is as happy making normal calls as it is secure calls. 
Tripleton Enigma is not tied to any specific network, it uses your existing mobile telephone number for both normal and secure calls.
There is no need to purchase or install any server and there is no need to make changes to the network . Two Tripleton Enigma mobile phones are all that is needed to make secure calls while on the move.

Secure calls cost exactly the same as normal data calls, while connection times require only an extra 7 seconds for initialisation of the encryption algorithms.

From the network perspective, a crypto call would be seen as a normal data/modem/fax call.

Pioneering technology

Tripleton Enigma technology is based around two internal SmartCards. The "GSM SIM", delivers standard GSM services. The other, issued by a globally recognised Trust Centre, delivers powerful authentication and encryption using established and open protocols. This is known as the Crypto-SIM or Netkey card.

Pioneering design merges these two technologies to create a unique, unbreakable cypher key for each and every call - providing failsafe point-to-point authentication and unbreachable privacy.

The crypto-system employed is a hybrid mechanism, which is a widely accepted and implemented in many high-end security products. The Tripleton Enigma achieves full bi-directional authentication with the secret keys held securely in, and never leaving, the safe environment of the Netkey/TCOS card.

Totally Secure Voice Encryption

Security Features

  • Secure voice communication (Crypto phone calls)
  • Can also operate as a standard GSM phone (Clear calls, SMS etc)
  • High performance crypto processor
  • State-of-the-art audio codec for crypto phone calls (excellent speech quality)
  • Integrated Crypto Smart Card Reader (2nd SIM)
  • Crypto-Module Operating System: TCOS certified to ITSEC E4+
  • Multi award winning Crypto-SIM certified to ITSEC E4+
  • True Random Number Generator implemented in Hardware
  • Asymmetric/Public Key algorithm: RSA
  • Symmetric algorithm: AES (256 bit)
  • Sim Lock
  • Call logging and Caller-ID deactivation
  • Exclusive communication groups using White List
  • Specific exclusion using Black lists (eg Stolen/Lost handsets)
  • Closed/Corporate User Group capability
  • No back doors or escrow keys of any kind
  • Entire system can be fully verified by customer or other independent body
  • Ease of use lends itself to all types of users
  • Inconspicuous design
  • Can operate with any existing GSM SIM (can keep your current phone number)

Additional Security Tools and Services

  • Crypto Management software and tools
  • Certificate creation and management tools (Customer-CA)
  • Cryptanalysis and verification tools and services.