SlideShare a Scribd company logo
1 of 2
Features
➤ Encrypted Voice Calls
➤ Encrypted Text Messages
➤ Encrypted Files Exchange
➤ 4096 bit RSA public key
➤ 256 bit AES private key
➤ AES algorithm with key exchange
➤ Wide range of mobile phones
➤ Supports GSM, EDGE, UMTS, 3G
➤ Supports WiFi
➤ Works without SIM card
➤ Software solution
➤ Password protected
➤ Stable and Tested
➤ No backdoors
➤ Perfect Voice quality
➤ Easy to use
Digitech d.o.o.
Podlimbarskega 29
1000 Ljubljana
Slovenia
t: +386 1 511 30 44
f: +386 1 511 30 45
e: info@digitech.si
i: www.digitech.si
digiCRYPT
end-to-end VoIP
encryption
for mobile
phones
digiCRYPT ...
is an end-to-end VoIP encryption software
solution for mobile phones. The application
enables encrypted full duplex speech
conversation, text messages communication
and file exchange.
It does not require any hardware upgrades on
the mobile phone itself. For the encryption,
4096 bit RSA public and 256 bit AES private
keys are used where the AES key is changed for
every session/conversation.
3G/UMTS, GPRS/EDGE or WiFi networks can be
used for transfering the voice and data
information (data connection). There is an
application available for a personal computer as
well (so calls from GSM phone to PC and vice
versa are possible).
Intended for ...
Nowadays, where a complex technology is
present in anyone's life, we simply can't even
imagine living without a mobile phone.
Is the conversation over a mobile phone
safe? Today your business competitors or
hackers can intercept mobile phone
communication with relatively little efforts.
Most users know, that in a case of intercepting
confidential data, a serious business hazard can
be obtained. The right of each individual is to
protect its own privacy.
digiCRYPT application ...
The application installation is very simple and
does not require any technical knowledge.
digiCRYPT can be installed on a personal
computer or on a mobile smartphone. It
supports secured mobile to mobile, PC to PC and
mobile to PC (vice versa) conversations.
After the digiCRYPT software is installed, we run
it and login using user name and password.
User name and password can be created on any
public XMPP server or the user can create and
use its own XMPP server. XMPP is used only to
exchange device IP addresses, all other
communication is direct device-to-device.
2 G , 3 G
W i F i
I n t e r n e t
d i g i C R Y P T d i g i C R Y P T
d i g i C R Y P T
P C a p l i c a t i o n
d i g i C R Y P T
P C a p l i c a t i o n
M a n a g e m e n t s e r v e r

More Related Content

What's hot

PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_enMarco Pissarello
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Thefthotspotshield
 
DigiTrail Sign Infoshure
DigiTrail Sign InfoshureDigiTrail Sign Infoshure
DigiTrail Sign InfoshureTechno Signz
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsFelipe Prado
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodesTran Thanh
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesPriyanka Aash
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatiaJayant Bhatia
 

What's hot (14)

PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
 
Stand options
Stand optionsStand options
Stand options
 
Ga13
Ga13Ga13
Ga13
 
Nanu
NanuNanu
Nanu
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
DigiTrail Sign Infoshure
DigiTrail Sign InfoshureDigiTrail Sign Infoshure
DigiTrail Sign Infoshure
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodes
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ Websites
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatia
 

Similar to digiCRYPT_ENG

Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015Tom Malatesta
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
SpeakInPrivate Phones - Introduction
SpeakInPrivate Phones - Introduction SpeakInPrivate Phones - Introduction
SpeakInPrivate Phones - Introduction Speakinprivate
 
Techno Signz Catalogue
Techno Signz CatalogueTechno Signz Catalogue
Techno Signz CatalogueTechno Signz
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communicationsPhantom Encrypt
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Technologically Abbreviated
Technologically AbbreviatedTechnologically Abbreviated
Technologically AbbreviatedAmal Biswas
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 

Similar to digiCRYPT_ENG (20)

TC75_SS
TC75_SSTC75_SS
TC75_SS
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
SpeakInPrivate Phones - Introduction
SpeakInPrivate Phones - Introduction SpeakInPrivate Phones - Introduction
SpeakInPrivate Phones - Introduction
 
Cryptography
CryptographyCryptography
Cryptography
 
Techno Signz Catalogue
Techno Signz CatalogueTechno Signz Catalogue
Techno Signz Catalogue
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
Most Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdfMost Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdf
 
Webinar Snom
Webinar Snom Webinar Snom
Webinar Snom
 
VoIP
VoIPVoIP
VoIP
 
Technologically Abbreviated
Technologically AbbreviatedTechnologically Abbreviated
Technologically Abbreviated
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 

digiCRYPT_ENG

  • 1. Features ➤ Encrypted Voice Calls ➤ Encrypted Text Messages ➤ Encrypted Files Exchange ➤ 4096 bit RSA public key ➤ 256 bit AES private key ➤ AES algorithm with key exchange ➤ Wide range of mobile phones ➤ Supports GSM, EDGE, UMTS, 3G ➤ Supports WiFi ➤ Works without SIM card ➤ Software solution ➤ Password protected ➤ Stable and Tested ➤ No backdoors ➤ Perfect Voice quality ➤ Easy to use Digitech d.o.o. Podlimbarskega 29 1000 Ljubljana Slovenia t: +386 1 511 30 44 f: +386 1 511 30 45 e: info@digitech.si i: www.digitech.si digiCRYPT end-to-end VoIP encryption for mobile phones
  • 2. digiCRYPT ... is an end-to-end VoIP encryption software solution for mobile phones. The application enables encrypted full duplex speech conversation, text messages communication and file exchange. It does not require any hardware upgrades on the mobile phone itself. For the encryption, 4096 bit RSA public and 256 bit AES private keys are used where the AES key is changed for every session/conversation. 3G/UMTS, GPRS/EDGE or WiFi networks can be used for transfering the voice and data information (data connection). There is an application available for a personal computer as well (so calls from GSM phone to PC and vice versa are possible). Intended for ... Nowadays, where a complex technology is present in anyone's life, we simply can't even imagine living without a mobile phone. Is the conversation over a mobile phone safe? Today your business competitors or hackers can intercept mobile phone communication with relatively little efforts. Most users know, that in a case of intercepting confidential data, a serious business hazard can be obtained. The right of each individual is to protect its own privacy. digiCRYPT application ... The application installation is very simple and does not require any technical knowledge. digiCRYPT can be installed on a personal computer or on a mobile smartphone. It supports secured mobile to mobile, PC to PC and mobile to PC (vice versa) conversations. After the digiCRYPT software is installed, we run it and login using user name and password. User name and password can be created on any public XMPP server or the user can create and use its own XMPP server. XMPP is used only to exchange device IP addresses, all other communication is direct device-to-device. 2 G , 3 G W i F i I n t e r n e t d i g i C R Y P T d i g i C R Y P T d i g i C R Y P T P C a p l i c a t i o n d i g i C R Y P T P C a p l i c a t i o n M a n a g e m e n t s e r v e r