majing seal

Michael Marking


Home
Bionic Buffalo
Buffalo Bull
Economics
Engineering
History
Languages
Law
Mathematics
Philosophy
Politics
Religion
Reading
Reviews
Software
Writing
Other
  Trademarks
  Public Keys
  Licenses
  Social Media
  Contact
  Web Site
    Information


What's New

tatanka.com home > software > Two Cans Voice Encryption

Two Cans Voice Encryption

Summary Description

This application permits secure, encrypted conversations between two telephone users, without using the internet. It works on a PC connected to an ordinary phone line, or in a smartphone on the cell phone network. Because it does not need the internet, it can work where no internet is available or where internet costs are high.

Two Cans includes a modem implemented in software. The soft modem creates a digital connection between the two phones. Standard voice encryption mechanisms are used across this soft modem connection. I am developing a gateway for interoperability among two cans users and internet phone users implementing SRTP or ZRTP; the gateway must run on a PC or other computer connected to the network and to an ordinary phone line.

To thwart man-in-the-middle attacks, two cans may employ the ZRTP short authentication strings, or it may use more conventional certificates.

Two cans also can be used for secure document transmission over the voice channel.

Several codecs and modems are being developed. Note that specification of a connection requires two codec types: one for digitization of speech, and the other to convert the encrypted data link back into audio form for transmission over the voice channel. Of course, depending on the platform, one or both codec types may restricted to available implementations. On a given link or connection, pre-existing hardware and software may strongly suggest certain specific combinations.

Two cans should be very secure. There are two main attack mechanisms: compromising the cell phone (or PC) itself, and man-in-the-middle attacks. A future project will focus on hardening the cell phones. Meanwhile, proper use of certificates should (absent physical or software compromise of the phone itself) minimize the risk of MITM attacks.

I expect to make two cans available under GPL 3.

Copyright 2017 Michael Marking. All Rights Reserved.
http://www.tatanka.com/software/twocans/index.html last modified Monday, 30-Jul-2012 02:22:07 CEST
Accessed Wednesday, 18-Oct-2017 11:21:04 GMT from 54.80.10.56:50864
Tatanka, Bionic Buffalo, sysjinn, and sysjinni are trademarks of Michael Marking.