The crypto-technology challenge


A message originally believed to be nearly impossible to break, becomes breakable some time later. A former U.S. government Data Encryption Standard (DES) encryption algorithm, was first officially broken in 1997, followed by a more efficient break in 1999 that allowed obtaining plaintext in just 22 hours.

It is believed that certain DES vulnerabilities were known well before. In 1977, Diffie and Hellman proposed a machine, which could find a DES key in a single day. By 1993, M. J. Wiener had proposed a key-search machine, which would find a key within 7 hours.

There is more evidence suggesting that modern commercial encryption, especially public key-based cryptography, could be vulnerable to sophisticated attacks—attacks that can be carried out by organizations having significant resources and access to sophisticated technology.

Confidentiality of communications

An international phone call travels through domestic and international networks that belong to different entities that could be subject to different laws. Essentially all telecom operators have technology in place to filter and collect communications, if and when needed. The likelihood of your communications being stockpiled somewhere by someone, acting within or outside of the legal frame and potentially capable of accessing and disseminating your information, is significant. Data in transit is generally easier to intercept and historically represents a low-cost information source for intelligence organizations.

Strong security detection

Various intelligence and security organizations monitor the Internet and telecom networks for use of strong cryptography as well as other unusual network activity. Once such activity is detected, it is analyzed to determine whether it could be of interest for investigating and possibly intercepting the communications. Not using strong communications security, on the other hand, and just relying on anonymity is not an alternative since the bulk of the Internet traffic today is intercepted and collected, at least temporarily, for analysis (depending on the laws where the data is collected). Therefore, it is essential to use strong security that is also capable of avoiding the unwanted detection. SECROM is currently working on the telecommunications solution that provides very strong protection of communications and at the same time minimizes the unwanted detection.


Secure Communication Solutions

Customers must be qualified to use SECROM. Certain products and services are only available to U.S. Persons, as defined in the International Traffic in Arms Regulations. Qualifications are subject to change without notice. Other limitations apply. All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.

Copyright © 2016 SECROM. All Rights Reserved.

Go to top