Upload
pilar-sanchez
View
216
Download
0
Embed Size (px)
Citation preview
7/31/2019 Safe Session Presentation
1/12
leave the risk of eavesdropping to
your business rivals
protect your conversation
7/31/2019 Safe Session Presentation
2/12
protect your conversationProblems of informational security
safe-session.com, 2011
Your companyYour company
You
ManagerYour team
Your rivals
dont share success with your rivals
7/31/2019 Safe Session Presentation
3/12
protect your conversationCryptographic Features
safe-session.com, 2011
ZRTP is a new cryptographic key-agreement protocol to negotiate thekeys for encryption
DiffieHellman key exchange algorithm allows two parties establish a
shared secret key over an insecure communications channel.
AES encryption is used around the world to secure the most
protected systems for government and business.
Advanced Encryption Standard (AES) is a symmetric-key encryption
standard adopted by the U.S. government.
The usage of another mathematical computational base (elliptic curves, GF(2^n)andGF(p))
provides the possibility of efficient optimization and the algorithms implementation
on various computational platforms
advanced cryptography make you feel safe!
7/31/2019 Safe Session Presentation
4/12
protect your conversationFrom Idea to Product
safe-session.com, 2011
Developers
Support
Security
Testers
High-end
Secure
Easy-to-use
safe and secure solution for your calls!
7/31/2019 Safe Session Presentation
5/12
protect your conversationKey Features
safe-session.com, 2011
Operation over 2G, 3G channels, WiFi
No additional hardware is required
The latest crypto innovations provide the highest security level
Ready for operation right after the installation
SafeSession is compatible with similar products from other vendors
no one is listening to your conversation
Protection against man-in-the-middle attack
The simplified protocol for low traffic capacity data links (9600 bps)
7/31/2019 Safe Session Presentation
6/12
protect your conversationProducts and solutions
safe-session.com, 2011
SafeSession
SafeSessionVoIP SafeSessionGSM
SafeSession Mobile
SafeSession Desktop
Symbian OS version 9.2
Symbian OS version 9.3
Symbian OS version 9.2
iOS
Windows OS
Linux OS
Mac OS
several variants of usage: over the GSM channel and over VoIP.
Symbian OS version 9.3
Windows Mobile OS
7/31/2019 Safe Session Presentation
7/12
protect your conversationSafeSessionVoIP Features
safe-session.com, 2011
Mac OS
Linux
Windows
Internet
VoIP
3G
Wi-Fi
GPRS
Wi-Fi
Ethernet
SafeSession Desktop SafeSession Mobile
Advantages
you can make your VoIP communication simple, reliable and safe!
Any SIP compatible device can talk to any other
Cryptographic protection of IP telephony voice data
No additional equipment or a phone provider
ver 9.2, 9.3
7/31/2019 Safe Session Presentation
8/12
GSM(CSD)
protect your conversationSafeSessionGSM Features
safe-session.com, 2011
GSM
SafeSessionGSM
GSM(CSD)
ver 9.2
SafeSessionGSM
No additional certificate and key servers
It doesnt require an Internet connection
Advantages
The simplified protocol for low traffic capacity data links (9600 bps)
No difference for mobile operator
Have you ever discussed your business deals
with your colleagues and partners over the phone?
ver 9.3 ver 9.2
ver 9.3
7/31/2019 Safe Session Presentation
9/12
protect your conversationTechnical details
safe-session.com, 2011
OS
SafeSession
AES
OS
SafeSession
key channel
data channel
9600+ bps (CSD)
Certificate
center
Man-In-the-middle
attack
Diffie-Hellman
eleptic curves
DH2K DH3K
key
material
ZRTP
ZRTP protection is the most up-to-date data encryption protocol
Protection against man-in-the middle attack
unprotected electronic Information is compromised daily
Advantages
Safe and secure solution for your calls
7/31/2019 Safe Session Presentation
10/12
protect your conversationSafeSessionGSM technical details
safe-session.com, 2011
Supported Devices
S60 3rd Edition Feature Pack 1, Symbian OS version 9.2
S60 3rd Edition Feature Pack 2, Symbian OS version 9.3S60 3rd Edition (version 3.0), Symbian OS version 9.1
Compatible Networks
GSM CSD 9.6
Encryption Algorithms
Encryption algorithm AES
Key length 256 bit
Session key generation - Diffie-HellmanECDH, 384 bit (elliptic curves)
Man-in-the-middle protection (MiTM), SAS mechanism
Key agreement protocol: 7RTP (ZRTP based, single crypto-component)
Keying material caching
Encryption productivity 1-1.5 megabyte/sec
All the cryptographic algorithms conform to NIST requirements
Sound Channnel
Supported codec AMR
7/31/2019 Safe Session Presentation
11/12
protect your conversationSafeSessionVoIP technical details
safe-session.com, 2011
Supported Devices
Symbian OS
IPhone
Windows OS
Linux OS
Mac OS
Compatible Networks
2G - GPRS/EDGE, 3G - HSDPA/UMTS, WiFi
Encryption Algorithms
Encryption algorithm AESKey length 128, 256 bit
Session key generation - Diffie-Hellman
DH2K, DH3K, DH4K (large numbers), ECDH 256,384 and 512 bit (elliptic curves)
Man-in-the-middle protection (MiTM), SAS mechanism
Key agreement protocols: ZRTP, 7RTP(ZRTP based, single crypto-component)
Keying material caching
Encryption productivity 1-1.5 megabyte/secAll the cryptographic algorithms conform to NIST requirements
Sound Channnel
Supported codec - AMR, iLibc, G711a(u), GSM, Speex
7/31/2019 Safe Session Presentation
12/12
protect your ideas
protect your conversation
http://safe-session.com/