Cryptophone 200 Manual

Cp200

GSMK CryptoPhone 200

Technical Specifications:

- Secure Tri-Band GSM Phone Trustworthy Voice Encryption

- Strongest and most secure algorithms available today – AES256 and Twofish 4096 bit Diffie-Hellman key exchange with SHA256 hash function

- Only secure mobile phone on the market with full source-code published for independent security assessments.

- Readout-hash based key authentication 256 bit effective key length

- encryption key is destroyed as soon as the call ends

- Standby: 180 hours

- Talk time: Secure up to 3 hours 15 minutes, Unsecured up to 5 hours 30 minutes

- Works in any GSM 900/1800/1900 network that provides data-call service (CSD data usually supported while roaming)

- No »proprietary« or »secret« encryption, no backdoors, no key-escrow

- No centralized or operator-owned key generation, no key registration, no extra »security SIM« – just call securely

- Provides effective and affordable protection against both IMSI-catchers and network based interception

- Security of the GSMK CryptoPhone can be independently verified with the published source-code

- Public, standards-based communication protocols for verification and development of compatible products

- Free GSMK CryptoPhone for WindowsTM client enables secure telephony between
landline users and the mobile GSM CryptoPhone 200, using just a computer with a modem

- Good speech quality (CELP)

- Can also be used with the enclosed professional quality headset (not required for operation, provides both ear-clip and headband mode)

- Packaged in a rugged watertight transport and storage case

- Large display, user-friendly and simple interface

- Based on commercial PDA-phone, accessories are available at normal prices from usual retailers