Military-Grade Encryption 

for Secure Communications

Unlike consumer-grade alternatives, Cellcrypt provides the strongest, most resilient, multi-layered encryption for secure voice, messaging, and file transfers.


To meet the growing challenge of operating in a Zero-Trust Environment (where it is assumed that the network is compromised), Cellcrypt' provides encryption that meets and exceeds the Suite B cryptographic standard as defined by the NSA (US National Security Agency).

Suite B Cryptography is required for all US Government Classified communications up to and including Top Secret. In addition, the implementation of a NIAP validated architecture is required for communications over the US Government's SIPRnet (Secure Internet Protocol Router Network).


Cellcrypt's cryptography is FIPS validated and exceeds the requirements of Suite B as standard, with NIAP (National Information Assurance Partnership) validated solutions that operate in a NIAP validated architecture.



Cellcrypt is built on a Multi-Layered Approach to Cryptographic Security.  

The following overview details this approach, with Obfuscation, Cellcrypt's Core Cryptography (Suite B - Top Secret), Post Quantum Protection, and where relevant, the NIAP (National Information Assurance Program) architecture.



All data - voice, messages, and file attachments - are first obfuscated using the ChaCha20-256 algorithm to mitigate any future potential AES vulnerabilities. This occurs before the data is encrypted through the Cellcrypt Crypto Core.


The Cellcrypt Crypto Core

Cellcrypt's Crypto Core exceeds the standards for cryptography and key length as set by the NSA pursuant to the Suite B standard and the Commercial National Security Algorithm Suite ("CNSA") guidance as published by the NSA, prior to the definition of a new standard, expected around 2024. 

Suite B / CNSA Suite Compliance


  • AES-256 (Fully Compliant).  

       Advanced Encryption Standard (AES), per FIPS 197, using 256-bit keys to protect up to TOP SECRET.


  • ECC-521 (Exceeds Key Length Standard of ECC-384). 

       Elliptic Curve Diffie-Hellman (ECDH) Key Exchange, per FIPS SP 800-56A, using Curve P-384 to protect up to TOP SECRET.


  • ECDSA-521 (Exceeds Key Length Standard of ECDSA-384). 

       Elliptic Curve Digital Signature Algorithm (ECDSA), per FIPS 186-4, using ECDSA-384 to protect up to TOP SECRET.


  • SHA-512 (Exceeds Key Length Standard of ESHA-384).  

       Secure Hash Algorithm (SHA), per FIPS 180-4, using SHA-384 to protect up to TOP SECRET.

All obfuscated data is secured end-to-end using a package of Elliptic Curve Cryptography (ECC) and Symmetric-Key Cryptography that meets or exceeds the standards of Suite B and CNSA for Top Secret communications. 


Cellcrypt’s crypto core has been twice validated to FIPS 140-2 by the US National Institute for Standards and Technology (NIST).


NIAP Architecture

With the Cellcrypt solutions for Classified, the cryptography described above is run through a NIAP architecture. The outermost layer with all server links being secured with TLS using NIST validated algorithms (ECC-384 and AES-256).


Cellcrypt’s cryptography has been twice validated by the US National Information Assurance Partnership (NIAP) under its Common Criteria Evaluation and Validation Scheme (CCEVS).

NIST FIPS 140-2 Validated
Cellcrypt has been twice validated to FIPS 140-2, by the US National Institute of Standards & Technology (NIST).


Post-Quantum Protection

Cellcrypt's Crypto Core is overlaid with Post-Quantum Cryptography 


  • Supersingular Isogeny Diffie–Hellman Key Exchange (SIDH 751) for Voice

  • Supersingular Isogeny Key Encapsulation (SIKE 751) for Messaging and Files


It is commonly agreed amongst cryptographers that Quantum Computers, capable of attacking current cryptography, are likely to be available within the next 10 years. 

As a result, Cellcrypt has taken the precaution of adding post-quantum cryptography.

This is done in a complementary way without reducing the security of our existing cryptography