top of page

BLOG

Your source for insights from our team on secure communications and encryption,
as well as tips and tricks to get the most from using Cellcrypt

Salt Typhoon Underscores the Need for Encrypted Calls with Post-Quantum Cryptography.

Updated: Nov 12


A hand holding a smartphone with a Secure Calls app visibile

Importance of Security in Communication

In recent months, a hacking group known as "Salt Typhoon" has infiltrated several U.S. internet and telecoms service providers, including major companies like AT&T, Verizon, and Lumen Technologies. These breaches have raised significant concerns about the security of telecommunications infrastructure and the potential exposure of sensitive information.


Key Developments:


  • Telecom Breaches: Salt Typhoon successfully penetrated the networks of multiple U.S. broadband providers, potentially accessing sensitive data and compromising systems used for lawful wiretaps. BleepingComputer


  • Targeted Surveillance: There is evidence suggesting that the group may have gained unauthorized access to iPhones belonging to senior officials of the U.S. presidential campaign, indicating a targeted approach to surveillance. AppleInsider


  • Government Response: U.S. authorities, including the Department of Homeland Security's Cyber Safety Review Board, have initiated investigations to assess the extent of the breaches and to develop strategies to mitigate future risks. Nextgov


Implications of the Breaches

The ramifications of these breaches are profound, encompassing:


  • National Security Risks: The unauthorized access to telecommunications infrastructure poses significant threats to national security, potentially allowing adversaries to monitor sensitive communications and disrupt critical services.

  • Erosion of Trust in Communication Systems: These incidents undermine confidence in the security of communication networks, prompting concerns among individuals and organizations about the confidentiality of their communications.

  • Operational Disruptions: The breaches have the potential to disrupt the operations of affected service providers and their customers, leading to financial losses.


How Cellcypt Ensures Communication Privacy

Communication privacy is essential in professional communication. With the rise of cyber threats, encrypted telephone calls provide a reliable solution to ensure conversations remain confidential.


Cellcrypt's secure communications platform offers end-to-end encryption to protect voice calls, messages, voice notes, and file transfers. This method ensures that only authorized parties can access the transmitted information, thwarting potential cyber intrusions (Cellcrypt).


Employing unique encryption keys for each session adds another layer of security. This means that even if an attacker were to intercept the communication, deciphering it without the correct key would be virtually impossible. The importance of maintaining data privacy cannot be overstated, especially for sensitive or proprietary information.


Protecting Sensitive Information

Sensitive information, such as financial data, confidential business strategies, and personal details, requires robust protection. Encrypting calls with a secure communications solution ensures that this critical information is not susceptible to unauthorized access.


Cellcrypt's Secure Communications Platform

Cellcrypt offers cutting-edge solutions for secure phone calls, providing robust security features to protect your sensitive communications. Below, we will delve into two core components of Cellcrypt's platform: end-to-end encryption and unique encryption keys.

Security Measure

Description

End-to-End Encryption

Ensures data is encrypted from sender to receiver without exposed vulnerabilities

Unique Encryption Keys

Each session utilizes distinct keys, nullifying the reuse of compromised keys

End-to-End Encryption

Cellcrypt's platform ensures that your encrypted telephone calls are protected from the origin to the destination. End-to-end encryption means that your data is encrypted on your device and only decrypted on the recipient's device. This method provides a high level of security, safeguarding your communications from potential eavesdroppers (Cellcrypt).


This level of encryption means that even if intercepted, the data can't be read or understood by unauthorized parties. This extends to multiple types of communication:

Feature

Description

Encrypted Calls

Protects voice communications from eavesdropping

Voice Notes

Ensures privacy in recorded messages

File Transfers

Secures data transmitted between users

Unique Encryption Keys

Provides unique keys for each session

Unique Encryption Keys

Cellcrypt further strengthens security by using unique encryption keys for every single communication session (Cellcrypt). These keys are generated on the fly and are unique to each call or message, significantly reducing the risk of unauthorized access. By doing so, Cellcrypt ensures that your telephony services remain uncompromised.


By integrating these critical security measures, Cellcrypt not only provides a secure platform for your calls but also ensures that your communications are impenetrable to unauthorized entities.


Post-Quantum Cryptography

With rapid advances in quantum computing, the security of your encrypted telephone calls is more critical than ever. Post-quantum cryptography offers solutions to ensure secure communications even in the face of these new threats.


Protection Against Quantum Computing Threats

Quantum computing poses a risk to traditional encryption methods. If adversaries intercept encrypted data today, they can decrypt it in the future when quantum computers are sufficiently powerful, exposing your sensitive information to what is known as the Harvest Now, Decrypt Later threat (Cellcrypt).


Cellcrypt’s use of post-quantum cryptography protects against these future threats while maintaining the integrity of classical encryption methods. This dual-layer approach, involving emerging quantum-resistant algorithms and existing encryption standards, provides robust protection for your secure smartphone communication.


Threat

Current Solution

Future Solution

Classical Computing Attacks

Classical encryption algorithms

Quantum-resistant algorithms

Quantum Computing Attacks

Limited protection

Post-quantum cryptography


Integration of Quantum-Resistant Algorithms

Cellcrypt employs post-quantum cryptography to future-proof its secure phone call solutions. This involves the use of advanced quantum-resistant algorithms designed to safeguard data against potential threats posed by quantum computing. Notable algorithms include CYSTALS-Kyber / ML-KEM and Classic McEliece (Cellcrypt).

Algorithm

 Feature

CRYSTALS-Kyber

Efficient and strong public key encryption

Classic McEliece

High security with proven resilience to quantum attacks

Module-Lattice-Based Key-Encapsulation Mechanism Standard aka ML-KEM

A FIPS standard set of algorithms based on CRYSTALS-Kyber (FIPS 203)

These algorithms work by employing complex mathematical problems that are challenging even for quantum computers to solve. By integrating these emerging technologies, Cellcrypt strengthens the security of its end-to-end encryption. This ensures that your communications remain secure, now and in the future.


What is ML-KEM, and how does it differ from CRYSTALS-Kyber?

ML-KEM is essentially the standardized version of CRYSTALS-Kyber, with some refined implementation details.


  • CRYSTALS-Kyber: Original algorithm developed by the CRYSTALS team

  • ML-KEM: Standardized version by NIST in FIPS 203


The terms are often used interchangeably, but there are subtle differences. ML-KEM's primary security advantage is its refined, standardized approach to quantum-resistant key exchange, which offers enhanced security proofs and implementation guidelines compared to the original CRYSTALS-Kyber algorithm.


Maintenance of Classical Encryption Integrity

Even as it integrates cutting-edge quantum-resistant algorithms, Cellcrypt remains committed to maintaining the integrity of classical encryption methods. This dual approach ensures that current security protocols remain uncompromised while adding an extra layer of protection against future quantum threats (Cellcrypt).


Maintaining the integrity of classical encryption involves frequent updates and compliance with global security standards. This enables Cellcrypt to offer dynamic security updates, ensuring that you remain protected against emerging threats.

Feature

Beneficial Aspect

Quantum-Resistant Algorithms

Protection against future quantum computing threats

Classical Encryption Integrity

Consistent and reliable data security

Dynamic Security Updates

Continuous protection from new threats

Global Standards Compliance

Assurance of best practices and protocols

By integrating both classical and post-quantum encryption technologies, Cellcrypt provides the most comprehensive security framework for secure mobile calls 


Secure Calling with Post-Quantum Cryptography for Enterprise & Government.


Cellcrypt provides encrypted calling services that are compliant with global standards, ensuring that your organization meets regulatory requirements while maintaining the highest level of security and

the integration of quantum-resistant algorithms and dynamic security updates ensures that your encrypted phone conversations remain future-proof and resilient against emerging threats.


Learn more about secure smartphone communication with Cellcrypt to understand the benefits of adopting Cellcrypt's secure call solutions.

1 Comment


crypto
Nov 10

I REALLY LIKED THIS BLOG, so I posted it in the LinkedIn group "Cryptographers and Cryptanalysts" (which I founded and manage), which has more than 16,000 members.


Cryptographers have been saying for MANY YEARS that BACKDOORS if they EXIST, they *WILL* BE EXPLOITED, and this blog emphasizes this point when it discusses the Telecom Breaches and “compromising systems used for lawful wiretaps.”


Cellcrypt's secure communications platform offers end-to-end encryption, which I believe to be REQUIRED in today’s world, as the above backdoor/breach illustrates.


Tony Patti, cryptographer and CIO Emeritus

Like
bottom of page