Menu
Your Cart

Encryption

AES Circuit Encryption is employed to prevent interception, tampering and disruption of public or private communication channels. The need to employ end to end circuit encryption is a top priority for organizations that are aware of their vulnerability. Circuits from the Phone company are commonly thought of as private and not accessible or requiring sophisticated equipment to tap.

Ready Access to Communication Channels

The vast majority of Telephone calls, Data networks and Video for Surveillance or Conferencing are interconnected over Time Division Multiplexed - TDM circuits from Regional Bell Operating Companies - RBOCs or Postal Telegraph and Telephone - PTTs.

Access to these interconnecting circuits can be obtained at the Telco Switching locations. There are numerous Telco switching centers that are unmanned and security at many of the manned locations is minimal and not in place 24 hours per day. Easily thwarted physical security provides ready access to the Telcos built-in TDM diagnostic circuit monitoring jacks.

Commercial Off the Shelf Wiretapping Equipment

The equipment necessary to tap into the TDM diagnostic monitoring jacks for Voice: E1 Test Equipment, Data: WAN Protocol Analyzers, Video: Receivers, is sold for less than $1,000 on EBAY. Sophisticated espionage can put the taps in place and utilize Wireless Ethernet or even a leased circuit of their own to transport the communication to a remote site where they are intercepted 24 hours a day.

Encryption Method

The Advanced Encryption Standard (AES) with 256 bit keys is utilised by the BlackBond to protect electronic data. The AES algorithm is a symmetric block cipher that encrypts and decrypts information. AES is a FIPS approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information.

 

Key Management

Automated key management configurations ensure timely key transitions and eliminate the operational and maintenance costs of managing an encrypted network with manual key distribution.

Check out our Encryption products