FM-crypto Encryption Software for Voice, SMS and file transfer
The Flexi Mobile FM-crypto offers Voice, SMS and file transfer encryption. Each application runs individually from the other on the mobile phone. The applications have to installed on both mobile phones to make the encryption work. Information technology professionals recognize encryption as the key weapon against espionage agents who attack corporations by attempting to intercept their mobile telecommunications.
It is a full-duplex solution. The software uses a 1024 bit RSA together with a 4096 Diffie-Hellman encryption and ARC4 or AES 256 algorithms, this guarantees the highest possible security levels. The software must be installed on all participating phones (so at least two).
To initiate a conversation the user must enter the phone number or select a contact from the phone book from within the application. For each new conversation Flexi Mobile Shield Voice will generate a random and unique encryption, this irreversible key is then extra encrypted with a Diffie-Hellman and an RSA encryption algorithm. After the key setup process, the actual conversation can start. The voice encryption is done with an adapted ARC4 or AES 256 algorythm with dynamic keys and encrypted with the RSA or DH key.
All this happens in seconds and other than using the contact from within the application.
Hybrid Secure Telephone Encryption: The Best of Both Worlds
In today’s global information-based economy, the ability to communicate confidential information securely is an absolute business necessity. Advances in technology have enabled instantaneous, reliable transmission of voice and data. However, secure telecommunications has remained a challenge. Until quite recently, the technology used to encode communications so that only the intended recipient can understand it – called cryptography – has lagged behind the capabilities of clever codebreakers. In the last few decades, codes based on “trapdoor” mathematical functions – functions that are easy to calculate, but hard to invert – have made highly secure communications possible. Indeed, today’s encryption methods are far more secure than the abilities of codebreakers to decrypt messages.
Corporate Espionage: A Very Real Threat
It is most likely inevitable that your organization’s information assets will be targeted for compromise or infringement when doing business in a global market.
Information theft is a multibillion-dollar industry, and corporate information security experts estimate that it is on the increase. According to a 2007 study sponsored by the ASIS Foundation and the Office of the National Counterintelligence Executive, “It is most likely inevitable that your organization’s information assets will be targeted for compromise or infringement when doing business in a global market. If an organization’s information assets are unprotected or underprotected, that organization may risk loss of control, use, or ownership of some of its intellectual property rights at some point in any business relationship. The challenge is to develop a security strategy that identifies, assesses, and addresses risks, and enables business transactions in a global market.” On demand we’ll provide you the technical aspects and also an offer for the preinstalled secure communication CRYPTOphone of your choice!
Any more questions ?
You have more questions?
Please check out our FAQ’s – frequently asked questions – and we are sure your questions will be answered. If you still have some, please feel free to contact us in live chat support.