
Security of personal confidential information Portable encryptors The CryptoGrapher, a personal palmtop-based encryptor The CryptoGrapher portable
10 The following equipment in the package: "Grot" scramblers (installed at the subscribers'); "Grot-C" station scrambl
11 The "Grot- C" scrambler must be installed in a room of an automatic telephone exchange. It is remotely controlled from th
12 The AncVoice Coder - 2400 specialized digital telephone set has been designed for operation in public telephone networks, either directly conne
13 sec mode 4 - V22bis recommendation (takes 7-10 seconds); in this case, the modems establish a connection faster than under V34, but if there i
14 Fig.1. The flowchart of AncVoiceCoder-2400 operation, where SCD is the speech conversion unit used for parametric compression of sp
15 telephone networks, provided that the other end is equipped with a similar board or with AncVoice Coder – 2400. HotLine – a
16 The center is built on the basis of specialized TEMPEST-compliant computers, and that provides protection against E-field radiation, throu
17 "Berkut" provides encryption and decryption of telephone conversation over simplex radio communication channels. And that guaran
18 Microphone VHF/UHF band Pho
19 Technical characteristics: Communication establishment time - 0.5 sec maximum; Service band - 300-3400 Hz; Speech intelligibility for the
2 Use the keyboard to enter the plaintext, which can be later edited. After the text has been encrypted, it may be read off the displ
20 The unit has been constructed as based on the principles of non-parametric signal conversion. At the input of the encryptor, the an
21 The "Berkut-K" – a hardware product for protection of voice signals transmitted over UHF/VHF radio channels "Berkut-K" po
22 Number of keys – up to 6; Power supply – onboard circuit, 12V, 27V (21-31)V; Radio set – VHF/UHF band; Operating mode - simplex; Weigh
23 Envelope measuring Modulo Unit
24 Sine cosine filter
25 "Berkut-D" – a delta modulation-based hardware product for protection of voice signals transmitted via UHF/VHF radio channels "Be
26 The unit is built on the principles of pseudo-random time and frequency permutations of signal spectrum and uses the "Tiger" algorithm
27 l.f. Coderamplifierl.f.filtersdifference circuitIntegrator Comparator Pulse
28 l.f. Coderamplifierl.f.filterDifference circuitIntegrator Comparator Impulse data
29 "Berkut-F" – a hardware product for protection of telephone and fax data "Berkut-F" has been designed for encryption of ph
3 (battery life at least 120 hours), or 220V AC via a supplied adapter Power consumption: 0.02 W "Ancrypt-II" – a palmtop-based encry
30 An automatic overload and wrong polarity protection is provided. The unit connects to the radio via a digital plug-in and a micro-telephone hands
4 Keyboard 33 Cyrillic characters; 26 roman characters; 10 digits; 14 control keys; 16 punctuation mark keys; Display 4-line LCD. Mai
5 Fig. 1. Flowchart of key generation The work of the key generating center consists of the statistical control stage and the key g
6 Upon the key generation stage is complete, the key sensor switches into the waiting mode until the next key generation command. If the
7 Method of encryption – mosaic array: timing transpositions and frequency inversion; High quality of reconstructed speech. Encryption algorith
8 SCR-M1.2 Scrambler Automatic caller ID, redialing, incoming and outgoing numbers memory, clock, alarm clock; The level of cryptographic pro
9 It is plugged in between the city phone line and the mini-ATX, providing secure communications for all telephone sets and fax machines connecte
Commenti su questo manuale