cryptofon-project Mailing List for Cryptofon
Cryptofon - a safe phone with integrated encryption.
Status: Planning
Brought to you by:
cryptofon
You can subscribe to this list here.
2013 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
(4) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
---|
From: Netzblockierer <Net...@pr...> - 2013-05-28 04:20:11
|
Hi Christoph, the submission for the call for papers of SIGINT13 was rejected w/o any further explanation. Until now, I do not know why the Chaos Computer Club decided so. Maybe it's because the project is completely new, or propably to keep distant of this stuff... Some tinfoil-hat even think they just don't want a second person to be eliminated... The story of Tron is a good example: I've spoken to some staff from tronland.net, and ''theholy13'' just geave me the advice just to take care... Why the damn are they so afraid? Who does people influece that effective so that they deny any connection?? Until now, some sort-of investigation of mine always leaded me to the SACEUR of the NATO. As today, the Tallinn-Manual officially declares war against any hacker - and this even includes a scriptkiddie with a portscanner. In this case, the use of lethal force w/o any kind of oversight is encouraged - and I mean against hackers who may just look for a vulerability with a positive reasoning (like reporting the issue), not against people that want to blow up a military base... Unfortunately, the goverment of my country disavows any relationship between ''legalized'' murder of people that are just smarter than the NATO is... Until then, we do have to keep on developing. For this, I recommend to take a look on the Codec2 development (http://codec2.org/) Am 27.05.2013 23:46, schrieb Christoph Machon: > Hi Netzblockierer, > > what happened? > > > Am Sun, 19 May 2013 14:28:36 +0200 > schrieb Netzblockierer <Net...@pr...>: > >> Hi everyone, >> >> I was informed recently that the Cryptofon-Talk submission for SIGINT13 >> has been canceled. >> >> Thereof, we should now focus on the project. >> >> >> I'm going to upload all files to SourceForge now. If you would like to >> register on SourceForge, it would be much easier to maintain the project. >> >> >> Greetings, >> Netzblockierer > > > > > ------------------------------------------------------------------------------ > Try New Relic Now & We'll Send You this Cool Shirt > New Relic is the only SaaS-based application performance monitoring service > that delivers powerful full stack analytics. Optimize and monitor your > browser, app, & servers with just a few lines of code. Try New Relic > and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_may > > > _______________________________________________ > Cryptofon-project mailing list > Cry...@li... > https://lists.sourceforge.net/lists/listinfo/cryptofon-project > > > > --- > avast! Antivirus: Eingehende Nachricht sauber. > Virus-Datenbank (VPS): 130527-1, 27.05.2013 > Getestet um: 28.05.2013 05:58:51 > avast! - copyright (c) 1988-2013 AVAST Software. > http://www.avast.com > > > > |
From: Christoph M. <ma...@gn...> - 2013-05-27 22:04:55
|
Hi Netzblockierer, what happened? Am Sun, 19 May 2013 14:28:36 +0200 schrieb Netzblockierer <Net...@pr...>: > Hi everyone, > > I was informed recently that the Cryptofon-Talk submission for SIGINT13 > has been canceled. > > Thereof, we should now focus on the project. > > > I'm going to upload all files to SourceForge now. If you would like to > register on SourceForge, it would be much easier to maintain the project. > > > Greetings, > Netzblockierer -- Mit freundlichen Gruß / Best regards Christoph Machon -- Twitter: https://twitter.com/krzym URL: http://www.gnuproject.org -- GPG Key-ID: CCE615D1 GPG Fingerprint: B18D 08A0 B1D6 6879 50FF 4436 BE07 4C54 CCE6 15D1 |
From: Netzblockierer <Net...@pr...> - 2013-05-19 12:30:12
|
Hi everyone, I was informed recently that the Cryptofon-Talk submission for SIGINT13 has been canceled. Thereof, we should now focus on the project. I'm going to upload all files to SourceForge now. If you would like to register on SourceForge, it would be much easier to maintain the project. Greetings, Netzblockierer |
From: Netzblockierer <Net...@pr...> - 2013-05-15 19:59:01
|
Hi everyone, I just finished the basic specifications as a VERY FIRST DRAFT, and would like to hear from you what you think about it... Until now, I did not figured out about the modem... I guess to keep it universal first, but maybe an improved version of the CCC Modem [http://www.offiziere.ch/trust-us/habi1/097_datenklo.html - german] may work pretty well... As you can read in the specs - it needs 2400 bit/s uplink and 2400 bit/s downlink.... As those acoustic modems seems pretty easy due to their use of FSK modulation [ https://en.wikipedia.org/wiki/Frequency-shift_keying ] - they keep the entire Cryptofon technology neutral... For now, we may consider looking after some kind of FTDMA and STDMA chips as well as crypto processors, supporting up to 8192 bits key lenght... Besides that the programming needs to be done... I'm looking forward for your feeedback, Greetings, Netzblockierer |
From: Netzblockierer <Net...@pr...> - 2013-04-22 17:43:42
|
Hi, in order to figure out the concept, I just aded a few schematics to the wepage (http://cryptofon.ne/ , you can find them in the developer section or directly here: http://cryptofon.net/img/Schematic%20Overview.png A schematic overview of the general concept. The Vocoder can be A Ti Stellaris® LM4F120 DSP. (http://www.ti.com/tool/ek-lm4f120xl) Codec2 works on it fine, and with a price of U$D 12,99 , it's pretty cheap. Also it can be reconfigured, just in case someone wants to use a propietary codec like MELPe or SPR (classic/robust) [see: http://dspini.com/index.php?com=page&sec=products&name=vocoders ] http://cryptofon.net/img/Key%20Generator.png A scheme of a hypothetic key generator. I should work with a 256kbit (262.144) RSA-PSS key pair. Session key lenght is 8 kbit (8.192). The session key may then be used for encryption using RSA-PSS and/or AES-256. As the bandwith is pretty narrow, RSA can be implemented easier than with higher bandwiths (As AES-256 is a bout 1.000x faster than RSA of equal lenght). In this case, the Cryptofon will not remain subject to the ''Wassenaar Agreement'' and U.S. export regulations, which only cover symetric encryption algorithms with key lenght over 64 bits. The encryption module is intended to be modularized (as it was on the original Cryptofon by Tron, too.), so that upgrades and modifications can be done using a standardtized interface (Preferably 25-pin Interface for 2x 9-pin RS-232 + power, GND and RS-485 for controller connection. Otherwise, three RS-232 connectors of 9-pin can be used, when power and GND are united from one source. In general, the intercommunication links may be RS-232, which could also be realized on two-wire RS-485 wiring (RS-232 to RS-485 adaptors needed) or even with optocouplers/fiberoptical) to create military-grade robustness against electromagnetic interferences. In the end, it will encrypt the entire data transfer and tunnel it as a regular modem connection, making it sound like random noise on a line. For the tinfoil-hats, there is still the possibility to add a scrambler and mix a fake-call into the line ;-) If you wounder about the narrow bandwith, then let me explain: Some public phone booths still use graphite mirophones and speakers. Thus to their very restricted capabilities, most acoustic couplers - even professional/commercial ones - cannot establish a stable connection with more than 2400 bit/s. To add a bit intereferece robustness, I suggest to add a static Forward Error Correction (FEC) of the Viterbi type. These are broadly used, espechally for DVB appilications. The FEC ratio 3/4 seems to be a good compromise - meaning 1800 bit/s are left as payload and being capable to compensate up to 25% random loss of bits. These 1800 bit/s may be multiplexed in two parts: * 1500 bit/s user payload * 300 bit/s protocol data / sync link This seems a heavy overhead, but it enables a pretty easy encoding of a bitwise-oriented protocol. Furthermore, it allows time-syncronization between the units. A pretty essential part, as the encryption is intended to use the present unix time as part of the key generator. With this, the units can meter the latency of the signal and may detect tries of man-in-the-middle attacks and eventually interception. The user payload may then be configured dynamically in 300 bit/s - steps (alike ''virtual channels'' as timeslots). * 0; 300; ... 1200; 1500 bit/s data transmission (a regular RS-232 transmission, which is oriented on old narrowband modems) * 0; 300; ... 1200; 1500 bit/s Voice (using Codec2) To exchange the configuration, the static protocol link will be fine. Please note: Until now, Codec2 requres at least 1200 bit/s. But as already prescribed in the mailinglist ''freetel-codec2'' and confirmed by David Rowe, the bandwith can be reduced to 800 bit/s (and possibly even lower) using vector quantization. A point we have to take a look at, and maybe test out. current Vocoders like MELPe are at 600 bit/s... the record is 300 bit/s ! To put in a nutshell: The Cryptofon is a modem with integrated digital voice encoder/decoder and encryption for the entire transmission. So far from me. Hope it's not too much... Gerrtings, Netzblockierer |
From: Netzblockierer <Net...@pr...> - 2013-04-21 19:32:06
|
Hi Christoph, nice to meet... I'm going to upload the project files ASAP... But first of all, I just want to make them ready for a presentation at the SIGINT13 in Cologne, NRW, Germany. For more info on the sigint, see http://sigint.ccc.de/ If you want, I can send over some details to you... Greetings, Netzblockierer Am 21.04.2013 16:00, schrieb Christoph Machon: > Hallo Mailinglist! > > lets the work begin :D |
From: Christoph M. <ma...@gn...> - 2013-04-21 14:20:42
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hallo Mailinglist! lets the work begin :D - -- Mit freundlichen Gruß / Best regards Christoph Machon - -- Twitter: https://twitter.com/krzym URL: https://gnuproject.org - -- GPG Key-ID: CCE615D1 GPG Fingerprint: B18D 08A0 B1D6 6879 50FF 4436 BE07 4C54 CCE6 15D1 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJRc/EGAAoJEL4HTFTM5hXRO18QAJ/5sUJmcNQVD0zGPeQx6xe/ PI3190h38pjZ1sdf+PrKZBiyAoj5fWyrDmavCnQ1bxfTPGt/FV9wMv1Y8PLTtFo9 nkr1QUcYHgHQI8jK9yZ+ifGxvd193zE2Lo2AkWeNBzTv5CyILZ7r5PAEgkHqcHLt OdXhyg7af3H1AEsNiHNIYIxsGSs1UMnCUNj5jctSSjrQWf0x/MEehKW/D7YuX4xZ 6RUjREBZ1sFme5FI6WSfDDGdA2HYMpribN97m5/MQXl78EEcKn9POqS2oqqmcBVq LQu5AHCMsIKhynVxRl3OxSyjZrVtfEGm6UczXfFIuix5hcaj50A1jtLggm5pSJJZ nfMqtC1CbYsxNKlvEjUyCBBKcjsKW2EVuSlYPqR6T5Pluyt3R6et9u9dqWuHgINh sjrXLNM7+L3rCnRksPZ0uY0TqvxHg7F7ipLGOtBSSEAZxz1wDiSxpU7kB7DOmNKs ouSqpy4FNqQ6aafczG1izvCDbnLGW+43f0nizdd4Q25yvr2PpWMUOLi/Tdll4ylo FlArnk6wPwumIQR89w72zroqJ3ACs+vmwKexJCe7YBIZS+nXqm1lVF/t3cOZIDqU PRXEkcL8bOVSYp9Joi/sTSobgCWllmESMbg8N9lhtuQs9jVttZg+hgGe+L+IWjVv 4akLtVKg1wsB+N0sGvVb =inFs -----END PGP SIGNATURE----- |