Secure Desktop CryptoPhone for professional users with 360° protection, hardened operating system and end-to-end encryption of voice and messages
safety, end-to-end encrypted Voice over IP calls. Strongest and most secure algorithms available today – AES256 and Twofish. 4096 bit Diffie-Hellmann key exchange with SHA-256 hash function. Read-out hash based key authentication. Autonomous key generation, no pre-installed key material. Encryption keys are securely and immediately deleted from the device after each call.
State-of-the-art graphical user interface for comfortable operation in combination with future-proof and reliable hardware.
A hardened operating system with security-optimized components and communication stacks protects the device from external attacks.
An encrypted storage system for contacts and messages protects dormant data from unauthorized access.
Verifiable source code
PKI CryptoPhones are the only secure mobile phones on the market whose source code is available for independent security assessments. This allows individual source code audits according to national and international verification and certification standards to verify the integrity mechanisms of the devices, the correct implementation of all encryption algorithms and the absence of backdoors.
Based on the same strong encryption algorithms used for PKI CryptoPhone voice encryption – 4096 bit Diffie-Hellmann initial key exchange, AES256 and Twofish message encryption with 256 bit keys.
Fully compatible with all secure PKI CryptoPhone IP mobile, desktop and satellite phones, including all secure phones of the PKI CryptoPhone 400, 450, 500, 500i, 600 and IP19 series and the PKI CryptoPhone IP PBX Gateways.