Secure Voice & Text

INFORMATION

What is AeroCom Secure Edition ?

AeroCom Secured Edition is the complete solution for trusted mobile communications, providing secure, real-time messaging, voice/conference calling, all protected by strong, authenticated, end-to-end encryption. With advanced encryption technology, phone calls and chat messages are private. AeroCom does not save any information about chats, messages, calls, pictures, photos or phonebook on the server.

Combining military-grade security with the ease of use, AeroCom requires no user training/configuration, ensuring fast and easy deployment, user acceptance and adoption across your customer base.

AeroCom uses standard encryption technologies including:

  • Advanced Encryption Standard (AES) for symmetric encryption
  • 384-bit Elliptic Curve Cryptography for Authentication
  • Elliptic Curve Diffie-Hellman (ECDH) for key agreement
  • Double Ratchet Algorithm to provide end-to-end encryption for messaging

End-to-end encrypted voice and messaging using dynamic encryption, which ensures that each call session or message threads are encrypted using a random algorithm and a random key handshaking. AeroCom encrypts all phone calls & messages using end-to-end encryption making it is impossible to eavesdrop on conversations.

END-TO-END ENCRYPTION TECHNOLOGY

Secure Voice

ZRTP for Secure Voice Traffic

    • Diffie-Hellman (DH) key exchange with Hash commitment for session key to provide perfect forward secrecy.
    • Short Authentication String (SAS) Base256 is calculated as Keyed-hash message authentication code (HMAC) of the shared secret from against Man-in-the-Middle-Attack (MitM).
    • Key continuity by caching key material from previous sessions for use in the next.
END-TO-END ENCRYPTION TECHNOLOGY

Secure Messaging

Advanced Technoogies for Secure Messaging

  • XMPP with Transport Layer Security (TLS) certificate pinning.
  • AeroCom offers future and forward secrecy and deniability with message synchronization and offline delivery.
  • Signal Protocol (Double Ratchet Algorithm) for end to end encryption and forward secrecy.

As cryptographic primitives, the Double Ratchet Algorithm uses:

  • for the DH ratchet
    • Elliptic curve Diffie–Hellman (ECDH) with Curve25519,
  • for message authentication codes (MAC, authentication)
    • Keyed-Hash Message Authentication Code (HMAC) based on SHA-256,
  • for symmetric encryption
    • the Advanced Encryption Standard (AES), partially in Cipher Block Chaining mode (CBC) with padding as per PKCS #5 and partially in Counter mode (CTR) without padding,
  • for the hash ratchet
    • HMAC