Dieses Dokument und der gesamte Inhalt ist urheberrechtlich geschuetzt. This document and the entire content is protected under the copyrights and Intellectual Property rights act. Do not use in any verbal or otherwise form or format, copy in parts or entirely, without the written permission of the copyright owner Dr. Bernard Bowitz - Germany notary sealed and registered : Document beginning "SecureScrypt" also known as "SSCSIM" ( SIM card based / integrated Voice Data encryption developed by Neoi Technology Partners and / or Bernhard Bowitz) Different from SD Card based solutions of earlier SecureScrypt versions, which did not allow a removable Media in Iphone, the SSCSIM version now allows a removable Media (SIM) on Iphones and so allows on all Hardware to remove critical files and Software completely from the Hardware and block all hackers from intruding into the encrypted files and media.
The SSCSIM or SecureScrypt is a combination/integration of Voice-Data encryption based on 256AES or higher* 1. * (The Advanced Encryption Standard (AES), also referenced as Rijndael) , Diffie Hellman (Diffie–Hellman key exchange (D–H)** ** a specific method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle) code, the SecureScrypt/Crysp encryption code (SSCSIM)*** *** an algorithm developed by Neoi Technology Partners**** **** Neoi is the registered Brand name of Bernhard Bowitz , Germany and Neoi Technology Holding Pte. Ltd. a Software and Hardware development partnership located in Germany and Singapore with the developed and assembled quell code (SSCSIM) integrated into a SIM Card*****. ***** A (SIM) subscriber identity module or subscriber identification module is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers). The SecureScrypt/Crysp (SSCSIM) Quell code is an advanced version of above cited AES, Diffie Hellman, Neoi Tec algorithm, with elliptic and/or symmetric/asymmetric Voice/Data encryption and SQL / Cassandra Data base. The new development is integration of the quell / source code into a SIM Card, therefore allowing a higher standard of security / encryption in mobile P2P / P2Proxy2P mobile and fix line communication and Data traffic. Using the standard security of SIM card hardware allows this advanced security standard (SSCSIM) developed by SecureScrypt / Crysp / Neoi developers. ***** The SIM circuit is part of the function of a Universal Integrated Circuit Card (UICC) physical smart card, which is usually made of PVC with embedded contacts and semiconductors. "Sim cards" are designed to be transferable between different mobile devices. The first UICC smart cards were the size of credit and bank cards; the development of physically smaller mobile devices prompted the development of smaller SIM cards where the size of the plastic carrier is reduced while the electrical contacts remain the same. A SIM card contains its unique serial number (ICCID), international mobile subscriber identity (IMSI), security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to and two passwords: a personal identification number (PIN) for ordinary use and a personal unblocking code (PUK) for PIN unlocking and the (SSCSIM). The (SSCSIM) is manufactured for licensed SIM card providers under the additional license of Neoi Technology to integrate the SSCSIM quell code. License will be provided by Neoi Technology to Partners contracted by Neoi Technology. Integrating the encryption code SSCSIM is a new unique way of Voice and Data encryption and first been developed and copyright protected by the above and undersigned Bernhard Bowitz and / or Neoi technology Holding Pte. Ltd. /Partners. More technical information for components and Software codes used in the development and are required to allow a certified and licensed partner to offer the SSCSIM. The SIM was initially specified by the European Telecommunications Standards Institute in the specification with the number TS 11.11. This specification describes the physical and logical behavior of the SIM. With the development of UMTS the specification work was partially transferred to 3GPP. 3GPP is now responsible for the further development of applications like SIM (TS 51.011) and USIM (TS 31.102) and ETSI for the further development of the physical card UICC. The first SIM card was made in 1991 by Munich smart-card maker Giesecke & Devrient, who sold the first 300 SIM cards to the Finnish wireless network operator Radiolinja. Design
SIM chip structure and packaging There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3 classes A, B and C, respectively). The operating voltage of the majority of SIM cards launched before 1998 was 5 V. SIM cards produced subsequently are compatible with 3 V and 5 V. Modern cards support 5 V, 3 V and1.8 V. Modern SIM cards allow applications to be loaded when the SIM is in use by the subscriber. These applications communicate with the handset or a server using SIM application toolkit, which was initially specified by 3GPP in TS 11.14 (there is an identical ETSI specification with different numbering). ETSI and 3GPP maintain the SIM specifications; the main specifications are: ETSI TS 102 223, ETSI TS 102 241, ETSI TS 102 588, and ETSI TS 131 111. SIM toolkit applications were initially written in native code using proprietary APIs. In order to allow interoperability of the applications, Java Card was taken as the solution of choice by ETSI. Additional standards and specifications of interest are maintained by Global Platform. Data SIM cards store network-specific information used to authenticate and identify subscribers on the network. The most important of these are the ICCID, IMSI, Authentication Key (Ki), Local Area Identity (LAI) and Operator-Specific Emergency Number. The SIM also stores other carrier-specific data such as the SMSC (Short Message Service Center) number, Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge parameters and Value Added Service (VAS) applications. (Refer to GSM 11.11.) SIM cards can come in various data capacities, from 32 KB to at least 128 KB. All allow a maximum of 250 contacts to be stored on the SIM, but while the 32 KB has room for 33 Mobile Network Codes (MNCs) or "network identifiers", the 64 KB version has room for 80 MNCs.[citation needed] This is used by network operators to store information on preferred networks, mostly used when the SIM is not in its home network but is roaming. The network operator that issued the SIM card can use this to have a phone connect to a preferred network, in order to make use of the best commercial agreement for the original network company instead of having to pay the network operator that the phone 'saw' first. This does not mean that a phone containing this SIM card can connect to a maximum of only 33 or 80 networks, but it means that the SIM card issuer can specify only up to that number of preferred networks; if a SIM is outside these preferred networks it will use the first or best available network. ICCID Each SIM is internationally identified by its integrated circuit card identifier (ICCID). ICCIDs are stored in the SIM cards and are also engraved or printed on the SIM card body during a process called personalization. The ICCID is defined by the ITU-T recommendation E.118 as the Primary Account Number. Its layout is based on ISO/IEC 7812. According to E.118, the number is up to 22 digits long, including a single check digit calculated using the Luhn algorithm. However, the GSM Phase 1[4] defined the ICCID length as 10 octets (20 digits) with operator-specific structure. The number is composed of the following subparts: Issuer identification number (IIN) Maximum of seven digits: · Major industry identifier (MII), 2 fixed digits, 89 for telecommunication purposes. · Country code, 1–3 digits, as defined by ITU-T recommendation E.164. · Issuer identifier, 1–4 digits. Individual account identification · Individual account identification number. Its length is variable, but every number under one IIN will have the same length. International mobile subscriber identity (IMSI) SIM cards are identified on their individual operator networks by a unique International Mobile Subscriber Identity (IMSI). Mobile network operators connect mobile phone calls and communicate with their market SIM cards using their IMSIs. The format is: · The first three digits represent the Mobile Country Code (MCC). · The next two or three digits represent the Mobile Network Code (MNC). Three-digit MNC codes are allowed by E.212 but are mainly used in the United States and Canada. · The next digits represent the Mobile Subscriber Identification Number (MSIN). Normally there will be 10 digits but would be fewer in the case of a 3-digit MNC or if national regulations indicate that the total length of the IMSI should be less than 15 digits. · Digits are different from country to country. Authentication key (Ki) The Kni is a 128-bit value used in authenticating the SIMs on the mobile network. Each SIM holds a unique Ki assigned to it by the operator during the personalization process. The Ki is also stored in a database (termed authentication center or AuC) on the carrier's network. The SIM card is designed not to allow the Ki to be obtained using the smart-card interface. Instead, the SIM card provides a function, Run GSM Algorithm, that allows the phone to pass data to the SIM card to be signed with the Ki. This, by design, makes usage of the SIM card mandatory unless the Ki can be extracted from the SIM card, or the carrier is willing to reveal the Ki. In practice, the GSM cryptographic algorithm for computing SRES_2 (see step 4, below) from the Ki has certain vulnerabilities[5] that can allow the extraction of the Ki from a SIM card and the making of a duplicate SIM card. Authentication process: 1. When the Mobile Equipment starts up, it obtains the International Mobile Subscriber Identity (IMSI) from the SIM card, and passes this to the mobile operator requesting access and authentication. The Mobile Equipment may have to pass a PIN to the SIM card before the SIM card will reveal this information. 2. The operator network searches its database for the incoming IMSI and its associated Ki. 3. The operator network then generates a Random Number (RAND, which is a nonce) and signs it with the Ki associated with the IMSI (and stored on the SIM card), computing another number known as Signed Response 1 (SRES_1). 4. The operator network then sends the RAND to the Mobile Equipment, which passes it to the SIM card. The SIM card signs it with its Ki, producing SRES_2, which it gives to the Mobile Equipment along with encryption key Kc. The Mobile Equipment passes SRES_2 on to the operator network. 5. The operator network then compares its computed SRES_1 with the computed SRES_2 that the Mobile Equipment returned. If the two numbers match, the SIM is authenticated and the Mobile Equipment is granted access to the operator's network. Kc is used to encrypt all further communications between the Mobile Equipment and the network. 6. The SSCSIM quell code will be loaded and identified with the SecureScrypt/Crysp node, starting the encryption protocol and process. SIM card Formats Samples
Full-size SIM (1FF), mini-SIM (2FF), micro-SIM (3FF) and nano-SIM (4FF)
SSCSIM state of the art specifications : • Crysp High end Voice/Message/Data Encryption- Software Version for all platforms ( Android 3.0+,Iphone 4+,Windows, Nokia (Smart), Blackberry (Android4+), Laptop(with USB Adaptor, Desktop Android Phone.
•
SecureScrypt same as Crysp, are now available with enhanced
security SSCSIM and/or SD card security
This principle
exclude that third
parties in a
communication engage
("Man in the
middle attack"). In addition,
the contact details,
messages, and texts in
the app
are encrypted as in a
secure container and
then stored
on the Smartphones separately.
For the
reading of the confidential
information, a password is required. Why is SecureScrypt such a big deal? Independent experts inform that its SSCSIM Security Card is “a mini-computer integrated into the SIM” that “contains something similar NXP SmartMX P5CT072 crypto-controller with a PKI coprocessor for authentication” and features “an additional high-speed coprocessor encrypts voice and data communication using 256 bit AES.” In plain English, this means that SecureScrypt’s top product has multiple layers of security to keep voice and data communications safe.
This is particularly important because in the wake of the
massive NSA spying scandal, many governments around the world have been
reluctant to trust American companies such as Microsoft and Google when
it comes to keeping their data safe. While there aren’t many people who
need a Smartphone that’s as secure as ones that are equipped with the
SecureScrypt SSCSIM, the people who do need it are a potentially
profitable niche. After all, both U.S. president Barack Obama and German
chancellor Angela Merkel both only use Smartphone devices for mobile
communications since no other
devices have yet proven themselves up to snuff.
Features Summary:
·
Encrypted voice communications (focus: wireless networks) · P1Proxy2P communication in countries were blocked P2P
·
VoIP based on UDP (connectionless) · Full encryption of Data , Documents, Video, Pictures and other Data traffic · Intuitive graphical user interface and use of the standard function keys and Automatic connection establishment as requested by partners and users · Mobile: WiFi, UMTS, EDGE, GPRS, Fixed line: LAN (where suitable)
·
Key exchange: Diffie-Hellmann 1024-4096 Bit · Removable media with SSCSIM or SD-Card, leaves not even a trace of any data or communication or logs. · encrypted local data in a safe location of the device ( SSCSIM or SD-Card)
·
Nurugo (FidoScrypt) password less authentication process for all
functions with bio-metric access control
A "hacking" of
SecureScrypt SSCSIM is
not only
pointless, but
completely useless.
Document end
|
|||||||||||||||||||||||||||||||||||||||||||||||||||