GSMK
CryptoPhone® 600G
Secure mobile phone for professional users
with 360° protection, hardened operating
system, Baseband Firewall, tamper-resistant
hardware and end-to-end voice and message
encryption
Supports the highest FIPS 140-2 and Common
Criteria security level requirements
NEW TAMPER-RESISTANT,
TAMPER-EVIDENT HARDWARE DESIGN
SECURE CONTACTS DETECT LOCATION TRACKING SECURE STORAGE
Secure contacts list and Detect attempts to track user Encrypted storage system for
call history time-line location via SS7 or silent SMS contacts, messages and notes
APP PERMISSION ENFORCEMENT HARDENED ANDROID EMERGENCY ERASE
Control access to network, data Secure Android built from source Last line of defense emergency
and sensors (camera, mic etc) with granular security controls erase function
Some phones promise privacy... Cryptophone delivers intelligence.
ESD America // [Link] // @cryptophoneusa // info@[Link] // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Secure Calls Tamper-resistant, tamper-evident hardware design
Secure end-to-end encrypted voice over IP calls on any network Dedicated hardware security modules with CPU supervisor,
– 2G, 3G, 4G, WLAN • Strongest and most secure algorithms watchdog timer, on-chip temperature sensor and removal-
available today – AES256 and Twofish • 4096 bit Diffie-Hellman resistant coating • Shield removal detection circuitry and
key exchange with SHA-256 hash function • Readout-hash Environmental Failure Protection (EFP) for temperature, voltage,
based key authentication • Autonomous key generation, no internal clock frequency, and duty cycle provided by immediate
pre-installed key material • Encryption keys securely and reset circuitry • Supports the highest FIPS 140-2 and Common
immediately erased from the device after each call Criteria security level requirements
Secure Messaging Trusted Platform Module (TPM) for platform
Based on the same strong encryption algorithms used for GSMK measurement and attestation
CryptoPhone voice encryption –4096 bit Diffie-Hellman initial Trusted Computing Group (TCG) TPM specifications level 2
key exchange, AES256and Twofish message encryption with 256 version 1.2, revision 116 • Active shield and environmental
bit keys sensors • Memory Protection Unit (MPU) • Hardware and
software protection against fault injection
Device Protection
Hardened operating system with secure boot and Encrypted Storage
device runtime integrity checks Encrypted storage system for contacts, messages, and
Secure Android OS built from source code with granular notes with smart folders protects data at rest against
security management and streamlined, security-optimized unauthorized access
components and communication stacks • Seamless secure boot
chain featuring secure boot, kernel, recovery, kernel object and Verifiable Source Code
APK signature keys • Runtime checks of core applications and GSMK CryptoPhones are the only secure mobile phones
services ensure that only signed and trusted code is loaded on on the market with source code available for independent
the device security assessments. This permits individual source code
audits in accordance with national and international
Configurable OS security profiles verification and certification standards designed to verify
Hardware module controller and permission enforcement device integrity mechanisms, correct implementation of all
module control access to network, data and sensors (camera, encryption algorithms, and the absence of backdoors
microphone, etc.), keeping you in control of your individual
security policies Compatibility
Fully compatible with all GSMK CryptoPhone IP secure
Baseband Firewall 2.0 mobile, desktop and satellite phones, including all GSMK
Unique protection against over-the-air attacks with constant CryptoPhone 400, 450, 500/500i and IP19 series secure
monitoring of baseband processor activity • Baseband attack phones as well as GSMK CryptoPhone IP PBX Gateways
detection and initiation of counter-measures • Automatic
discovery of IMSI Catchers and rogue base stations • Detection of
attempts to track user location via SS7 or silent SMS
AS SEEN ON
ESD America // [Link] // @cryptophoneusa // info@[Link] // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Enterprise customers asked for more features...
Cryptophone 600G is the answer
Technical Data Display
Quad–core Krait CPU 2.3GHz, graphics accelerator, QDSP, 5” Full HD (1080*1920) LCD, Glove-usable capacitive touch,
microSD card slot functional in wet conditions
Radio Camera
GSM/GPRS/EDGE (850/900/1800/1900 MHz), UMTS/HSDPA+ 8 MP with Autofocus and LED Flash, 2 MP for front facing
(B1, B2, B4, B5, B8), LTE advanced (3GPP, FDD, IMS, VoLTE, applications, Full HD video capture and playback, both
Carrier Aggregation, B2, B3, B4 , B5, B7, B13, B14, B17, B20) cameras can be disabled
Connectivity Mechanical
USB 3.0 (fast charging), Wi-Fi 802.11 a/b/g/n/ac, accessory Dimensions 141mm x 75,5mm x 13,5mm, 180g, IP67 rating, MIL-
interface for connecting custom extension modules, such STD-810G shock resistant, Temperature range -20°C to +55°C
as sensor accessories, TETRA or tactical radio modules, car (-4°F to 131°F)
charger and satellite modules
Audio
High-performance speakers, multi-microphone ANC
360˚ SECURITY: END-TO-END ENCRYPTED VOICE AND MESSAGING ON A FULLY ARMORED PLATFORM
nnHigh Assurance CryptoPhone Security nnFull source code available for review
nnIP67 water and dust protection nnHardened Android OS
nnMIL-STD-810G shock resistant nnEmergency erase function
nnGlove-usable touch screen nnMade in Germany
nnExtremely durable mechanical design
USER
SHA-256
Encryption Overview value II 0x02 256 bit key
Diffie - Hellman 4096bit SHA-256 value II 0x01 SHA-256 256 bit key Twofish
Counter
128 bit
value II 0x00 SHA-256 256 bit key AES-256
XOR
Your local reseller
keystream
Voice Data
from Codec
MUX XOR
User Data
Messages
ENCRYPTED DATA
ESD America // [Link] // @cryptophoneusa // info@[Link] // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Not all secure phones are created equal. Accept no compromise.
%#"!
! "!
#("%!"! ,))
&#
!
%#
%#
#("%
!!"
#("%$
#("%
$$$
!.!
!
%
'
!$!'
""#$$! $
$
"
$
""!%!
#!
$!* # '
.*+)#%
''"
!
! $
! "
$
!
!'#%'
" $#
!
$!
%#%%!
$ $"
!! #
#%%!
! (
- (% %##!%! %%!
! & #
!
%%/ %
0
!
$
)
!& %#(!#
!#$%!"&
info@[Link] / @cryptophoneusa / [Link]
7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128