Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Encryption Security

Cell Phone Encryption? 42

Black Diamond asks: "I know I'm not up to speed on cell phone encryption, but I was wondering, are there any cell phones that let you handle the encryption from your end of things? Something along the lines of a phone you hook up to your computer to input specific encryption keys for specific contacts, as well as a private key for yourself. Is such a thing plausible, or should you trust the standard encryption that comes on some cell phones nowadays?"
This discussion has been archived. No new comments can be posted.

Cell Phone Encryption?

Comments Filter:
  • by Chasing Amy ( 450778 ) <> on Wednesday April 16, 2003 @08:44AM (#5743086) Homepage
    This isn't exactly what you're asking about, but the closest thing I can think of offhand would be PGPfone--a product abandoned years ago for encrypting voice communications much as PGP encrypts text.

    There are both binaries and source code available here:

    Windows and Mac only, and it's a very crude app... It would be nice for someone to develop something more robust and with better features.
    • by Anonymous Coward
      See also Speak Freely (active project,
      for Unix + PC) and Nautilus secure
      phone. All free & Free.

      PGPfone can do modem-to-modem.
      Put them on your pocket PC
      and cable that to your regular
      cell phone.

      Problem is the other end needs the
      same setup.
  • by martin ( 1336 ) <maxsec@gmai[ ]om ['l.c' in gap]> on Wednesday April 16, 2003 @08:54AM (#5743126) Journal
    This would prevent law enforcement agencies tapping the signal.

    There has to be way of 'wire tapping' any comms system according to various laws around the world so the 'good guys' can listen to the 'bad guys' (court orders etc needed).

    The has been alot of stuff on the UK on this (cf ukcrypto list), the cryptos used and how it was weakened to enable 'legal' phone tapping to occur.

    • by shakah ( 78118 )

      This would prevent law enforcement agencies tapping the signal.

      Strictly speaking, LEA's could still "tap", encryption would just make it more difficult to make sense of the captured voice stream (in the case of a voice intercept, that is). And even with "user encryption", you could still service "pen register" and "trap and trace" warrants (basically timestamped records of who called who).

      Furthermore, though I can't find the reference now, I remember reading that carriers are permitted to offer "unrever

  • by wowbagger ( 69688 ) on Wednesday April 16, 2003 @09:28AM (#5743279) Homepage Journal
    GSM (and PCS) phones encrypt the traffic anyway (at least they do outside the USA).

    That is one of the big advantages of digital cellular modes over older, analog cellular modes - the ease of adding encryption.

    However, if you want to throw another layer on top of this, it gets more difficult - since digital phones take the audio signal and vocode it, you cannot just scramble your voice and feed it in - the vocoder won't know what to do with it and won't encode it properly. You would have to inject your signal after the vocoder but before the Viterbi/Trellis coding.
    • by Anonymous Coward
      > GSM (and PCS) phones encrypt the traffic anyway (at least they do outside the USA).

      No they don't. The GSM protocol supports the capability, but it isn't necessarily turned on. At least one of the UK operators does not use it.

      The algorithms are also dated, and it has been demonstrated that can be readily compromised, in real time, using off the shelf hardware available today.

    • by Splork ( 13498 ) on Wednesday April 16, 2003 @10:08AM (#5743512) Homepage
      No they don't.

      (a) Both GSM and CDMA encryption are flawed and can be broken.

      (b) It doesn't matter if the encryption is bad, all GSM phones listen for a single bit from the tower they're communicating with that tells it if it should encrypt or not. It is trivial for anyone with the resources to eavesdrop on a digital phone call to setup their own fake tower to tell your phone to turn encryption off.

      (c) so what if mobile phones encrypt, phone lines that they connect to don't.

      never trust commercial "encryption" to be anything more than the magic decoder ring from your cerial box wrapped in a DMCA wrapper calling anyone that points out that its made of cheap injection molded plastic an information terrorist.
      • by wowbagger ( 69688 ) on Wednesday April 16, 2003 @10:19AM (#5743580) Homepage Journal
        It is trivial for anybody with the resources to build a faster than light drive, too - for some definitions of "with the resources".

        It would depend upon whom this guy wishes to protect his conversations against - J. Random Carbonunit or Special Agent TLA.

        If the former, than the encryption used in GSM is enough - few people have the gear to modulate and demodulate a GSM signal with proper time slotting, time of flight correction, etc. Making a GSM signal is HARD - I build gear that does it.

        If the latter, then they won't screw around picking the signal off the air - they will throw a CALEA intercept on his phone when it hits the PTSN. Then the only thing that can protect him would be VERY strong encryption seperate from the phone - which as I said in my first posting is difficult due to the nature of digital phones.

        Lastly, if he is trying to protect himself from Special Agent TLA, encrypting his signal like this won't help - it will just raise a big red flag saying "Look At Me! I Am Hiding SomeThing!". He would be far better served making an innocuous word code and using that.
        • I've used some of the gear you build and I can't see how this is trivial by any measure.

          Unless you enjoy designing custom analog/digital hardware, there is just no way you're going to override the single byte in a stream that selects clear encoding, and then just listen to a clear channel conversation. The "man in the middle" attack is your only hope for using off the shelf toys. You'll need proper amps., a sharply directional antenna, and GSM phone-test-set that will exchange two-way pcm data with suff
          • I was not saying it was trivial - the person to whom I was responding said it was.

            I was saying quite the contrary - it WASN'T trivial.
            • Yes. I got it.

              Sorry about the lack of clarity. I needed to make better use of the <Ironic Tone></Ironic Tone> tags. Though the speed of light hard drive analogy seemed accurate, I wanted to outline some of the hurdles involved to illustrate the point that this is not a cellular FM radio using frequency inversion or something else for which a cool black box and a scanner will make for trivial snooping. This is $20k+ worth of toys and a significant engineering investment.
      • Ok, so I want to easedrop on you and i have alot of resources. I'm going to put up some renegade cell phone tower that will overpower the legit tower and provide service to thousands of people... and I'll do this all over an area or city?

        It would be easier to follow you with a parabolic microphone.

        My recommendation to you is to tighten your tinfoil hat.

      • never trust commercial "encryption" to be anything more than the magic decoder ring from your cerial box wrapped in a DMCA wrapper calling anyone that points out that its made of cheap injection molded plastic an information terrorist.

        beautifully worded! *applause*
      • (a) Both GSM and CDMA encryption are flawed and can be broken.

        I'm not sure which CDMA encryption you are talking about, but using a phone like this [] would make breaking its encryption a hard feat to accomplish.

    • > GSM (and PCS) phones encrypt the traffic anyway

      Of course, but the encryption is in between your handset and the BTS (the base station). Then the traffic is in clear, until they are again aired by another BTS (or, if they reach another phone line which doesn't encrypt, it is in plain all the way).

      So the phone company, if they wished, or bribed, or forced by legal authorities, can tap your call. And moreover, GSM uses A5/1 encryption which is broken anyway.

      What is actually needed is peer to peer encr
  • data encryption?? (Score:3, Informative)

    by ( 562495 ) on Wednesday April 16, 2003 @09:30AM (#5743290) Homepage
    i m not sure, what you are trying to ask, but that is not going to stop me from answering your question. :)

    Are you asking about encrypting the data stored on your fone? or encrypting the data transfer between your fone and your service provider?

    If it is a Pocket PC /Palm OS based cell phone, then there are some encryption apps out there that can help you. Here are some links:
    http://w -fc.shtml

    However good encryption/decryption take up lots of CPU power, so I dont know how feasible it is to ecrypt all the data on your cell phone.

  • If my memory serves me correctly, CDMA is a form of spread-spectrum modulation. It's fairly resistant to evesdropping by your average crook, although there's no doubt that big brother can tune in if he wants. Hell he doesn't even necessarily need to receive your signal, he could have the phone company tap it at the cell site. I don't know much about other types of cell phones.

    One thing you could do, if you can use your cell phone as a modem (I think most digital phones can do this at fairly high speed) the
    • by nbvb ( 32836 ) on Wednesday April 16, 2003 @10:07AM (#5743501) Journal
      Correct, CDMA is spread-spectrum and the encryption is relatively difficult to crack.

      Nobody's been able to demonstrate real-time listening capabilities (yet).

      But it is a well-known fact that the law enforcement guys have taps at the cellular switches, so they just plug into the call before it goes to hardwire -- they don't even bother trying to listen out of the air, and why should they? It's a lot easier to listen at the switch .........

      Now, as for GSM, its encryption is definitely crackable in realtime... In fact, there have been industrial espionage problems across the English channel because of this .... go look it up :)
      • Correct, CDMA is spread-spectrum and the encryption is relatively difficult to crack. Nobody's been able to demonstrate real-time listening capabilities (yet).

        Where do you get this stuff? CDMA is 2G tech to allow multiple subscribers to share a frequency. Rather than multiplexing by timeslots (TDMA), each mobile subscriber transmits a code so the tower can distinguish between different calls on that frequency.

        It has nothing to do with security. It is one solution to the problem of having more subscrib
        • It might not overty be related to security, but it adds to the overall security of the connection. It's scattered over a huge swath of frequency, along with hundreds or thousands of other calls. All of this arrives at the base station, and the system there determines which pieces and in what order make up each particular conversation.

          And I don't know what the fuck you're talking about, but CDMA has nothing to do with either 2G 2.5G or 3G. Those have to do with data capabilities. That is all. Would you also
    • As for using your phone as a modem, it can seem workable.

      With today's bleeding edge technology: I was just looking at the sprint wireless site, and found this pdf on one of the laptop modem cards. u ipment/H andsets/pdf/yisocf2031.pdf
      It claims to have a total baud of 230.4 bps
      recieve at 153.6 and sent at 76.8
      Although this is the maximum baud, and the speed is changeable.
      (so theortically you get, but in reality...)
      These plans start at $100/mo with 300 MB data, or $120
      • This is what I would suggest too. However one must remember the KISS principle (Keep it Simple Stupid) meaning that if you really want it secure using a cell phone is probably not the best way to go about it!

        • Actually something like a PGPSoftphone running over the data channel wouldn't be a bad deal, especially if you could get a SIM card for your GSM phone(like in europe, no info needed). Anonynimity, movable location and strong encryption. It would be hard to beat for non-interceptable communications.
  • by extra88 ( 1003 ) on Wednesday April 16, 2003 @10:42AM (#5743739)
    I just do a Darth Vader imitation and speak in Pig Latin. Since I started doing this I haven't been hassled by The Man once!
  • You can buy a modified version of the S35i that does station-to-station strong encrption. Do a Google on "Siemens TopSec".

  • by kousik ( 149219 ) <kousik DOT nandy AT gmail DOT com> on Wednesday April 16, 2003 @11:59AM (#5744209) Journal
    But not in the form you say. There exist chips which will do a Diffie-Hellman exchange to set up a secret key, and then do AES encryption on the whole conversation. Comes as a Sony-Ericsson accessory.

    Of course, lack of standard make these chips non-interoperable (not encryption/decryption but key management). Once it becomes popular standards need to emerge.
  • by Enrico Pulatzo ( 536675 ) on Wednesday April 16, 2003 @02:11PM (#5745141)
    just learn Navajo. Works for some [] people.
    • As long as he is in the USA, simply speaking in a non english language is secure...
  • Take a look at the Tiger [] GSM phone from Sectra [].
  • Secure CDMA Phone (Score:1, Informative)

    by Anonymous Coward
    Check out the Qualcomm QSec-800 for a CDMA equivalent of the Siemens TopSec, although you might have to work for the government to get one for now anyway.
  • Motorola (Score:4, Informative)

    by kruczkowski ( 160872 ) on Wednesday April 16, 2003 @05:24PM (#5746923) Homepage
    I know that Motorola just released an addon to a off-the-slef phone that adds comsec.

    From what I understand, phones with this devices are aproved by NSA for secret transmittions.

    Doing a google seach I came up with this: /g eneral_dynamics_sectera_secure.htm

  • Rhode+Schwarz [] offers GSM mobiles with encryption and PCMCIA cards for GSM mobiles. Ironically, it manufactures also so-called IMSI catchers, which allows secret services and other "authorities" to intercept any GSM mobile.

    By the way, GSM is encrypted by default, but the providers can switch that off at any time without notification

  • This company used to, and still does (I think) make good encryption add-ons for cell phones and radios. Don't know much about how to purchase them or what quals. you have to have to buy, but you certainly should give them a call to ask.
  • This company used to (and still does I think) make encryption devices for cell phones and radios. I'm sure they'd be happy to tell you how to buy their products. :)
  • ...the only way to do it would be to manage it via a computer-like device connected to your phone and then use GPRS or somesuch to send the data through your mobile phone.

    What about the other end, you say?

"I prefer the blunted cudgels of the followers of the Serpent God." -- Sean Doran the Younger