Encrypt Phone Calls For Under $100 25
An anonymous reader wrote in to say "Seen on the IP list: a California company
plans to offer
a box that will securely encrypt your phone
conversations, for less than $100 apiece. The
company was founded by Cypherpunks who were
upset about Clipper and wanted to create a good
alternative. Looks like they're almost done. "
Re:Remember the guy who built Sadaam's super canno (Score:1)
The only threat to "national security" is that the administration won't be able to use wiretapping to get the jump on their political opposition any more. Thank goodness, we may finally exorcise the ghost of the Nixon administration.
Yay (Doh!) (Score:1)
--Eric Gradman
PGP key available.
(first?)
A dedicated box (Score:1)
That way you could run all your data securely, and it'd be much
faster than software encryption.
Re:Yay (Doh!)? (Score:1)
LINUX stands for: Linux Inux Nux Ux X
Re:A dedicated box (Score:1)
Phil Karn, KA9Q, has a web page [qualcomm.com] where you can listen to samples of various voice encoding techniques.
For digital data, you skip the vocoder and pipe the data into the ECC (error correction code) encoder and modem.
It's about time (Score:1)
BTW, the NSA, being recalcitrant in its dealings with congress may find itself extremely short of funds soon if they don't cooperate on the investigation of Echelon and other boondoggles.
safer... (Score:1)
LINUX stands for: Linux Inux Nux Ux X
Encrytion Not Secure (Score:1)
Re:Suckers (Score:1)
Re:Encrytion Not Secure (Score:1)
Suckers (Score:1)
Re:Encrytion Not Secure (Score:4)
Not so. The article says they are using the Diffie-Hellman key-agreement algorithm, which means that there is no permanent key at all -- no private key to steal. Instead, the two units will negotiate a new key each time you make contact with someone, but makes no effort to ensure that you are talking to the right person. You are simply expected to know their voice or to recognize them in some other way.
They are using 2048-bit Diffie-Hellman which is about as secure as 2048-bit RSA. Diffie-Hellman is based on the discreete-logarithm problem and the best algorithms for solving that, given a large modulus, is pretty much the same algorithm that would be used to factor a large integer. The state of the art in factoring integers still below 512 bits, but is about to reach that mark. What is more, calculating one discreete-log will only give you the session key for a given session and no information about all the previous and subsecuent sessions, so it is even less appealing than trying to break RSA of the same size.
What the attacker can do is to launch a man-in-the-middle attack, so your box will talk to the TLA-agency's box in a secure manner, that box will be sitting next to another box talking to the person you really wanted to talk to. Then they just cross-wire the audio signal and tape everything. This, however, is a much more difficult attack to launch. You need more support from the phone-company and more hardware to pull it off.
It is also possible that the article is oversimplifying slightly and that there is some sort of identification going on in the hardware, but that would be much more difficult to use and people would frequently mess it up. The real problem in cryptography is key management. The rest is easy.
Re:Suckers (Score:1)
Re:It's about time (Score:1)
Anyways, if this product is anywhere near "secure" then I don't expect it to make it to market (at least in the US) anytime soon...If it does appear unmodified, that'll mean that there are methods to decipher it.
Remember Crypto AG? (Score:1)
Man-in-the-middle? (Score:1)
...not a security person...
Re:Suckers (Score:1)