1 / 20

NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and

(NDLO/CIS). NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and NSK 250 Secure Management Centre. Features of the NSK 200. Conversations up to NATO SECRET. GSM-GSM. GSM-DECT. DECT-DECT. Encrypted data channel Voice transmission Data transmission

stacia
Télécharger la présentation

NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. (NDLO/CIS) NSK 200 GSM Secure Telephone, NSK 201 DECT Single Base Station and NSK 250 Secure Management Centre

  2. Features of the NSK 200 Conversations up to NATO SECRET GSM-GSM GSM-DECT DECT-DECT

  3. Encrypted data channel • Voice transmission • Data transmission • Is used towards NSK 200 • Plaintext speech channel • As ordinary GSM/DECT • Used between all other phones • SMS can only be sent as plaintext GSM Transmission channels

  4. DECT/PSTN 28,8 kb/s GSM/PSTN 9,6 kb/s GSM/DECT Data transmission IrDA IrDA Encrypted File-transferNATO SECRET

  5. NSK 200 - Technical details Dimensions: 56 x 140 x 30 mm Weight: 235 g GSM phase 2: Dual band 900/1800 MHz Battery capacity: 810-880mAh Stand-by-time: Approx. 70 hours Operation time: Approx. 3 hours Data Interface: Infrared, IrDA Data Speed: GSM: 9,6 kbit/s DECT: up to 28,8 kbit/s Security: NATO UNCLASSIFIED NATO RESTRICED NATO CONFIDENTIAL NATO SECRET

  6. IrDA Interface Quick-menu Smart Card Interface Hands-free Contact Battery Charger NSK 200 Overview Menu-wheel

  7. NSK 200 bracket for car • Car charger • Hands-free combined w/external antenna • Tabletop charger • Portable charger 220V • DECT Base station w/connection to PSTN, analogue line Accessories

  8. Features of the NSK 200 • Encrypted speech is transmitted using the GSM asynchronous transparent data service • The GSM net performs interleaving of data packets, which results in a minor delay when using encrypted speech • Encrypted speech and data • Plaintext speech and data • Plaintext SMS • Encrypted SMS is not supported

  9. Red LED (call/registration) Green LED (power) Registration button PSTN (Analogue line) Power Digital Enhanced Cordless Telecommunications (DECT) SUB

  10. Public network Digital Enhanced Cordless Telecommunications (DECT) SUB

  11. Features of the DECT SUB • The DECT SUB, NSK 201, is mainly used in areas without GSM coverage, connected to the PSTN by an analogue line • The NSK 200 must be registered in the DECT SUB before making calls • This is done by activating registration menu in the NSK 200 and pressing the Registration button on the SUB

  12. Features of the DECT SUB • Encrypted speech and data • Plaintext speech and data • NSK 200 supports 28,8 kbps for data calls in DECT mode.

  13. Security Management Centre (SMC) OSP SMC (Other Service Provider) SMC

  14. Features of the SMC • The main purpose of the SMC is to distribute traffic keys to the SPs (Secure Phones) in the system. • The SMC is configured as a dual SMC. • The SMC includes a database comprising all customer information. • SMC can be connected in a network to other OSP (Other Service Provider) SMCs.

  15. Traffic Key Can be fetched from everywhere Traffic Key Can be fetched from everywhere Group Key Has to be loaded by Crypto Custodian Only valid for a minor group NSK 200 can be loaded with both Traffic Key and Group Keys Key Management

  16. Security Requirements • General information of the NSK 200 and security classification. • Physical Security of NSK 200 • Be aware threat of acoustic eavesdropping • Use of infrared transmission • How the Access Card is functioning • How to clear key memory in NSK 200 • Emergency destruction of the NSK 200 • Breach of Security. Two SDIPs (User and System) under publication The user of NSK 200 shall be familiar with National Security Requirements:

  17. How to use NSK 200 • Switch on the phone • Insert CIK and press ”OK” Insert CIK Ok Skip Please wait, communicating with SC… You can now remove CIK Ok Enter PIN1 Ok Skip Encr. mode 110601 08:05 N Telenor Last No. Ph.book **** • Remove CIK (insert the PIN code) • Ready for use in encrypt. mode

  18. How to make encrypted call ? NSK 200 in Encrypted Mode: • Three ways to make a call: • Dial the number directly • Quick code buttons • Via Phone Book Encr. mode 050401 08:05 N TELENOR Last No Ph.book Encrypted speech Client Name Connecting End NATO RESTRICTED 1:47 Client Name Choice End Via Phone Book, select person: Select number, press ”Call”: A voice is announcing security level of the call twice, than the connection is established:

  19. How to make plaintext call ? NSK 200 in Plaintext Mode: • Three ways to make a call: • Dial the number directly • Quick code buttons • Via Phone Book Encrypion mode 050401 08:05 N TELENOR Latest Ph.book Make plain call Ok Cancel Plaintext mode Call Delete Plain speech 23092940 Connecting Choice End 23092940 Select ”Make plain call” in the menu Dial number and press ”Call” The connection is established:

  20. How to make encrypted DECT call ? NSK 200 in Encrypted Mode: • Three ways to make a call: • Dial the number directly • Quick code buttons • Via Phone Book Encr. mode 050401 08:05 N TELENOR Last No Ph.book Encrypted speech Client Name Connecting DECT End NATO RESTRICTED 1:47 Client Name Choice End Encr. mode 050401 08:05 DECT Name Last No Ph.book Select DECT on the Quick Menu ”R”-buttton Via Phone Book, select person: Select number, press ”Call”: A voice is announcing security level of the call twice, than the connection is established:

More Related