Nanoteq's Code Voice Mobile handset adds security to mobile trafic.

Dec '99 Infrastructure

It is estimated that, in most developed countries, the volume of mobile telephone traffic now equals the volume in fixed networks. As mobile traffic continues to increase, the use of fixed services is likely to become the exception rather than the rule. Users demand mobility, a single number and unlimited coverage, and handset and network designers are increasingly meeting these needs.

In line with this, Nanoteq is securing mobile telephone traffic with the release of the CodeVoice Mobile handset.

Eavesdropping is still a problem

However, says Nanoteq Communications Security Product Manager Chris Burger, the same security problems that plague fixed networks are also evident in mobile networks. The design target for the GSM system’s cryptography is a good example. While the probability of fraud has been restricted greatly, eavesdropping is still a problem. The design target was simply to ensure that the air interface is no less secure than the rest of the network.

The air inferface is indeed secure, but given the fact that mobile telephone traffic also travels along landline backbones at some point along the route, the total system’s security level is shaky at best.

Several countries have also introduced legislation to enforce the government’s ability to eavesdrop on all kinds of communications, forcing network equipment vendors to incorporate tapping mechanisms on all network nodes.

Clearly, if a user requires confidentiality, security measures must be incorporated in the user’s own equipment, outside of the network operator’s domain.

Nanoteq’s CodeVoice range enables the user to implement secure communications across any mixture of networks. Products for PSTN and ISDN can simply be connected between a telephone instrument and the line, and offer transparent operation and very high security. There are also several facsimile encryption products, including CodeFax and CipherFax 100.

“CodeVoice Mobile is the only product in the range that replaces the user’s handset with a new instrument. The handset has a very similar appearance to most mobile telephones. On the back panel is a standard PC card slot, into which a range of interfaces can be connected. This modular approach allows the handset to be used with any new technologies that might emerge in future, without having to replace the handset itself,” he notes.

A GSM module and a landline modem have already been integrated, and an Inmarsat Mini-M terminal can interface to the handset through its data port. The handset allows the user to send any mixture of voice, data and fax traffic, using a serial communications port on the base of the handset.

High security

The encryption system provides high security, with a key length of more than 100 bits. This key length meets even the most rigorous security requirements.

Burger says CodeVoice Mobile benefits from Nanoteq’s expertise in key management systems. An administrator can issue an individual with any combination of rights. “For example, a senior staff member might have rights to make secure and open calls to anyone, while a junior staffer might be restricted to secure calls to other members of the organisation.

Keys and privileges are stored in smartcards. These cards are protected by PINs, and lock themselves if an outsider attempts to use them. Only an administrator can unlock a locked card,” he explains.

“For customers with very specific needs not served by the standard products, custom features and algorithms can be engineered to specification. For customers with extreme security requirements, arrangements can be made to audit any or all of the design parameters,” he concludes.

For details contact Nanoteq on tel: (012) 665 1338, fax: (012) 665 1343 or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Next-gen solar-powered switches
Infrastructure
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Cyberattacks the #1 cause of business outages
Editor's Choice Information Security Infrastructure
The latest survey by Veeam Software shows that 92% of organizations will increase their spending on data protection by 2024 to achieve cyber resilience due to continued threats of ransomware and cyberattacks.

Read more...
Nology races to end 2023
Editor's Choice News & Events Infrastructure
Nology ended 2023 with an event highlighting its various products and services to the local market, followed by a few laps around the Kyalami Indoor Karting track.

Read more...
Cybersecurity integrated with data protection
Technews Publishing News & Events Infrastructure
Last year's VeeamOn Tour conference in South Africa was a smaller version of the annual global Veeam conference, aimed at the company's regional partners and customers.

Read more...