Call Today 716.688.4675

Secure Communication

Secure communication provides a range of information security solutions to ensure communications security over public and local networks. Our security software is developed in accordance with industry standard security protocols and services, including private key and public key cryptography. Please contact us to discuss your specific secure communications requirements with our engineering staff.

download brochure

Secure Communication Software – Key Management

  • Key Management – provisions made in a security system for the generation, exchange, storage, safeguarding, use, and replacement of keys.
    • AKA – Authentication and Key Agreement
    • AKE – Authenticated Key Establishment
    • GDOI – Group Domain of Interpretation
    • IKEv1 – Internet Key Exchange version 1
    • IKEv2 – Internet Key Exchange version 2
    • ISAKMP – Internet Security Association and Key Management Protocol
    • KEA – Key Exchange Algorithm
    • KINK – Kerberized Internet Negotiation of Keys
    • MIKEY – Multimedia Internet KEYing
    • MOBIKE – IKEv2 Mobility and Multihoming Protocol
    • OAKLEY – Key Determination Protocol
    • PKI – Public Key Infrastructure
    • PKINIT – Public Key Cryptography for Initial Authentication in Kerberos
    • PKIX – Public-Key Infrastructure using X.509 Certificates
    • PKM – Pairwise Key Management
    • PSK – Pre-Shared Key
    • SDES – Session Description Protocol Security Descriptions for Media Streams
    • SKEME – A secure and versatile key exchange protocol for key management over Internet
    • TEK – Token Encryption Key
    • TKIP – Temporal Key Integrity Protocol
    • ZRTP – Media Path Key Agreement for Secure RTP (SRTP)

Communications Security

  • Communications Security – messages passed in such a way as to keep them secret from anybody except the intended reciever.
    • CCMP – Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
    • DMS – Defence Messaging System
    • DTLS – Datagram Transport Layer Security
    • EAP – Extensible Authentication Protocol
    • EAPoL – EAP over LAN
    • EAPoW – EAP over Wireless
    • HTTPS – Hypertext Transfer Protocol Secure
    • IPsec – Secure Internet Protocol
    • MSP – Message Security Protocol
    • SASL – Simple Authentication and Security Layer Protocol
    • Secure SIP – Secure Session Initiation Protocol
    • SRTP – Secure Real-time Transport Protocol
    • SSH – Secure Shell Protocol
    • SSID – Service Set Identification
    • SSLv3/TLSv1 – Secure Sockets Layer/Transport Layer Security
    • S-HTTP – Secure Hypertext Transfer Protocol
    • TSN – Transitional Security Nertwork
    • WEP – Wired Equivalent Privacy
    • WiMAX Security – DES-CBC encryption/authentication and PKM
    • WPA – Wi-Fi Protected Access
    • WRAP – Wireless Robust Authentication Protocol
    • WTLS – Wireless Transport Layer Security (TLS)
    • XTLS – Extensible Messaging and Presence Protocol (XMPP) traffic via an application-level usage of Transport Layer Security (TLS)

Information Security

  • Information Security – Methods to secure information.
    • CMS – Cryptographic Message Syntax
    • FTPS – File Transfer Protocol Secure
    • JPSEC – Secure JPEG2000
    • MSP – Message Security Protocol
    • MOSS – MIME (Multipurpose Internet Mail Extensions) Object Security Services
    • PEM – Privacy Enhanced Mail
    • PFS – Perfect Forward Secrecy
    • PGP – Pretty Good Privacy
    • Secure ACAP – Secure Application Configuration Access Protocol
    • Secure COMedia – Secure Connection-Oriented Media Transport
    • Secure COPS – Secure Common Open Policy Service
    • Secure IMAP – Secure Internet Message Access Protocol
    • Secure POP – Secure Post Office Protocol
    • Secure SMTP – Secure Simple Mail Transfer Protocol
    • SET – Secure Electronic Transaction
    • SFTP – Secure File Transfer Protocol
    • S/MIME – Secure / Multipurpose Internet Mail Extensions
    • SNEWS – Secure Network News Transfer Protocol (NNTP)

Applied Security

Software Libraries

VOCAL’s embedded software libraries include a complete range of ETSI / ITU / IEEE compliant algorithms, in addition to many other standard and proprietary algorithms. Our source code is optimized for execution on ANSI C and DSP architectures from TI, ADI, ARM, AMD, Intel, MIPS and other vendors. These libraries are modular and can be executed as a single task under a variety of operating systems or standalone with its own microkernel.

supported-platforms

VOCAL Technologies, Ltd.
520 Lee Entrance, Suite 202
Amherst New York 14228
Phone: +1-716-688-4675
Fax: +1-716-639-0713
Email: sales@vocal.com