Secure communication provides a range of information security solutions to ensure communications security over public and local networks. Our security software is developed in accordance with industry standard security protocols and services, including private key and public key cryptography. Please contact us to discuss your specific secure communications requirements with our engineering staff. Secure Communication Software - Key Management \tKey Management - provisions made in a security system for the generation, exchange, storage, safeguarding, use, and replacement of keys. \tAKA - Authentication and Key Agreement \tAKE - Authenticated Key Establishment \tGDOI - Group Domain of Interpretation \tIKEv1 - Internet Key Exchange version 1 \tIKEv2 - Internet Key Exchange version 2 \tISAKMP - Internet Security Association and Key Management Protocol \tKEA - Key Exchange Algorithm \tKINK - Kerberized Internet Negotiation of Keys \tMIKEY - Multimedia Internet KEYing \tMOBIKE - IKEv2 Mobility and Multihoming Protocol \tOAKLEY - Key Determination Protocol \tPKI - Public Key Infrastructure \tPKINIT - Public Key Cryptography for Initial Authentication in Kerberos \tPKIX - Public-Key Infrastructure using X.509 Certificates \tPKM - Pairwise Key Management \tPSK - Pre-Shared Key \tSDES - Session Description Protocol Security Descriptions for Media Streams \tSKEME - A secure and versatile key exchange protocol for key management over Internet \tTEK - Token Encryption Key \tTKIP - Temporal Key Integrity Protocol \tZRTP - Media Path Key Agreement for Secure RTP (SRTP) Communications Security \tCommunications Security - messages passed in such a way as to keep them secret from anybody except the intended reciever. \tCCMP - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol \tDMS - Defence Messaging System \tDTLS - Datagram Transport Layer Security \tEAP - Extensible Authentication Protocol \tEAPoL - EAP over LAN \tEAPoW - EAP over Wireless \tHTTPS - Hypertext Transfer Protocol Secure \tIPsec - Secure Internet Protocol \tMSP - Message Security Protocol \tSASL - Simple Authentication and Security Layer Protocol \tSecure SIP - Secure Session Initiation Protocol \tSRTP - Secure Real-time Transport Protocol \tSSH - Secure Shell Protocol \tSSID - Service Set Identification \tSSLv3/TLSv1 - Secure Sockets Layer/Transport Layer Security \tS-HTTP - Secure Hypertext Transfer Protocol \tTSN - Transitional Security Nertwork \tWEP - Wired Equivalent Privacy \tWiMAX Security - DES-CBC encryption/authentication and PKM \tWPA - Wi-Fi Protected Access \tWRAP - Wireless Robust Authentication Protocol \tWTLS - Wireless Transport Layer Security (TLS) \tXTLS - Extensible Messaging and Presence Protocol (XMPP) traffic via an application-level usage of Transport Layer Security (TLS) Information Security \tInformation Security - Methods to secure information. \tCMS - Cryptographic Message Syntax \tFTPS - File Transfer Protocol Secure \tJPSEC - Secure JPEG2000 \tMSP - Message Security Protocol \tMOSS - MIME (Multipurpose Internet Mail Extensions) Object Security Services \tPEM - Privacy Enhanced Mail \tPFS - Perfect Forward Secrecy \tPGP - Pretty Good Privacy \tSecure ACAP - Secure Application Configuration Access Protocol \tSecure COMedia - Secure Connection-Oriented Media Transport \tSecure COPS - Secure Common Open Policy Service \tSecure IMAP - Secure Internet Message Access Protocol \tSecure POP - Secure Post Office Protocol \tSecure SMTP - Secure Simple Mail Transfer Protocol \tSET - Secure Electronic Transaction \tSFTP - Secure File Transfer Protocol \tS/MIME - Secure / Multipurpose Internet Mail Extensions \tSNEWS - Secure Network News Transfer Protocol (NNTP) Applied Security \tApplied Security - Application of security methods and protocols. \tDocument Signature by Multiple Parties Software Libraries VOCAL's embedded software libraries include a complete range of ETSI / ITU / IEEE compliant algorithms, in addition to many other standard and proprietary algorithms. Our source code is optimized for execution on ANSI C and DSP architectures from TI, ADI, ARM, AMD, Intel, MIPS and other vendors. These libraries are modular and can be executed as a single task under a variety of operating systems or standalone with its own microkernel.