29

I could be out of context here about security, but , I would like to know if phone lines or phone calls over VOIP could be made secure .

I know that Skype and other VOIP service providers have to give access to respective governments of countries who request authorization of phone calls from their country . The normal phone lines themselves are unsecure.

I am talking from a perspective of a kid(in terms of security) who watches movies and thinks what does it mean and how do they do it ? I would really like to know the secret that if its actually possible.

  • "The phone line at our end is secure , is your connection secure ?"
  • "Are we on a secure phone line ?"
Thomas Pornin
  • 320,799
  • 57
  • 780
  • 949
Sairam
  • 693
  • 1
  • 9
  • 15
  • 1
    For an interesting example of this (using SIP) check out https://ostel.me/, an implementation of the Open Secure Telephony Project (https://guardianproject.info/wiki/OSTN) – Sam Whited Apr 30 '13 at 13:39

8 Answers8

13

A secure phone line is conceptually possible; this is not really different from, e.g., a secure communication between a Web browser and a HTTPS server (there are technical subtleties about lost packets and whether they should be tolerated, but that is not the issue here). However, the movie-secure phone is not secure, and that's a structural problem.

The problem lies in the question: "is your connection secure ?". If you need to ask to the other guy whether the line is secure, then the line is not secure. That's as simple as that. A "bad guy" could hijack the line and, when you ask whether the connection is secure, the bad guy could simply respond "yes it is !", counterfeiting the voice of the intended recipient (and, in the other direction, he could "replace" the question by an innocent sentence).

In a secure phone line, the caller and the receiver shall be authenticated to each other, which can be done with various cryptographic tools (e.g. digital signatures, or, more simply, a shared secret). Variants of the same tools also establish a session-specific shared secret which can be used to symmetrically encrypt the data. Bottom-line is that once people begin to actually talk, the line should already be secure and both participants shall have ways to know it (e.g. they are using special phones which refuse to communicate if security is not achieved). Otherwise, there is no security.

On a more practical point of view, if I were to implement a phone-like secure system between two entities, I would investigate using VoIP over a VPN. This would require some delving into the details of the VoIP protocol, so I would do that with an open protocol (i.e. Ekiga, not Skype).

Thomas Pornin
  • 320,799
  • 57
  • 780
  • 949
  • 1
    You're assuming that there's no end-to-end security (crypto, etc). The question "is your connection secure" is about "have you flipped the 'secure this call' switch" :) – Bill Weiss Jan 21 '11 at 16:29
  • 3
    As a nit-pick, if the switches on both sides weren't in the same position, no communication would be possible. – Jeff Ferland Sep 14 '11 at 13:37
  • I will go for `WbeRTC` + Async cryptography for caller-callee authentication regardless of signaling server provided methods. – Xaqron May 07 '17 at 06:20
6

Or dedicated, isolated phone lines, such as the famous "red phone" between the US president's office and the USSR premier, back in the days of yore (Don't know if this is still around).
(or the batphone in Commisioner Gordon's office...)

AviD
  • 72,138
  • 22
  • 136
  • 218
  • I'm not sure even these can technically be considered truly secure. Imagine if someone could establish a tap mid-stream in the phone line, anywhere along its path. Without encryption, the signals are readable by anyone with the means to receive them. – Iszi Jan 20 '11 at 15:48
  • 9
    @Iszi: The "red phone" was using encryption. Actually, it was using the most secure encryption ever: a one-time pad. The random pad (XORed with the data to send) was exchanged on magnetic tapes every week, by special diplomatic planes. I do not know what they were doing for integrity protection against active attacks, though. – Thomas Pornin Jan 20 '11 at 17:20
  • 1
    Thanks, @Thomas! That's what I thought too, but I figured with this crowd I should check my sources before I spouted something that I only *"figured"* of truth, and didnt have time to look it up yet. Maaan, its good to have a real-life cryptogrologistican on the site! :D – AviD Jan 20 '11 at 18:27
  • 9
    Oh, and the second one in the answer used bat-cryption, even stronger than one time pad. Bat-cryption also supports integrity protection by using a round-Robin technique (i.e. Robin would patrol around the hardline and beat up anyone who tampers with it.) – AviD Jan 20 '11 at 18:28
  • @Thomas & @Avid - Thanks for the clarification. It helps to have those points addressed for those of us not so familiar with the implementation details of the "red phone". – Iszi Jan 21 '11 at 05:41
  • The "red phone" never existed. It was an OTP encrypted text communication channel. – CodesInChaos May 07 '17 at 08:52
  • Thanks @CodesInChaos, see also Thomas's (ancient) comment above... And my comment on batcryption ;-) – AviD May 07 '17 at 10:52
4

These still exist, and many countries military and law enforcement agencies use them. Dedicated devices acting as line encryptors are very expensive to run, with requirement to securely deliver keys/certs to each endpoint so for most people software equivalents are appropriate.

You can secure your VOIP link the same way you would encrypt any IP link - you just need to be a little cleverer as voice calls are not as tolerant of lag and jitter as data comms.

Rory Alsop
  • 61,367
  • 12
  • 115
  • 320
  • Don't forget the cost to physically secure those devices. FAR from trivial. Unless you're already the military, of course. – AviD Dec 07 '10 at 22:26
4

Yes they can be made secure by encrypting data or through mutual authentication of both parties.

for more information check http://en.wikipedia.org/wiki/Secure_telephone and http://www.helpturk.org/telephone-line-encryption.htm

Mohamed
  • 1,404
  • 1
  • 11
  • 14
  • 2
    I think Mohamed's answer is best in that he is pointing out that this needs to be done on both ends of the phone line so that the "conversation" is encrypted/decrypted at each end. In other words the transport mechanism is by default inherently unsecure. – Anonymous Type Nov 16 '10 at 23:26
4

This is more of an interesting tidbit than an answer: given a common way of implementing the compression and cryptography for VoIP (VBR and stream cipher), it is still possible to see the length (in time) of spoken words as the data goes past. Based on this information, you can do interesting things like infer the language being spoken or even recognize certain phrases. These attacks have been the subject of two recent papers at top security conferences.

PulpSpy
  • 2,204
  • 15
  • 19
3

The "secure government phone line" in movies is due to a keyed, programmed encryption device built-in to each phone. The data is encrypted/decrypted on each end.

2

Here in the Netherlands, until recently all electronic payments with a debitcard (and creditcard) were done through a secured telephone line. This was demanded by the government to ensure consument security. Hence, the simple answer to you question is yes, you can secure a telephone line.

Henri
  • 1,525
  • 10
  • 11
  • 1
    how was this implemented? Was this really rolled out to the whole country, or was paying by CC on the phone a special privilege? – AviD Nov 16 '10 at 23:38
  • It was rolled out in the whole country. There was an monopoly by Interpay (now called Equens) who was the only one allowed to set-up electronic payments by means of magnetic cards or smartcards. – Henri Nov 21 '10 at 15:32
  • This seems unlikely as it would require every household to have a secure phone and, more importantly, would require nationwide key management. – President James K. Polk Dec 11 '10 at 01:23
  • @GregS - no, not households. Shops/Companies etc. – Rory Alsop Jan 21 '11 at 01:12
  • 1
    @RoryAlsop - So, "all electronic payments" is actually referring to the transaction that occurs between vendor and card provider - not the part that occurs between the customer and the vendor? – Iszi Jan 21 '11 at 05:44
2

A secured phone line would indicate that there is encryption in place. This would be similar to how we do encryption in networks using TLS, etc. The line on it's own would not typically be encrypted, but the data flowing over the line would be encrypted. Typically, there is encoding software/hardware built into the phone units or you could encrypt the data using an external device that then goes over the phone line. If this is a digital phone system, the encryption can be just like TLS, SSH, etc. You can have mutual authentication, a lookup table for the shared key, etc. It is also possible to do "analog encryption" by doing modifications to the carrier signal and demodulating them on the receiver's end, though analog encryption is typically more complex to use and frequently requires synchronization since you are not dealing with discrete chunks of data (see scrambling).

You should know ahead of time if you are using an encrypted line or not. There may also be other considerations such as securing the physical medium to limit the ability for someone to tap the line and know that any repeaters, switches, etc are secure. If the line is secure on one side, the other side would hear gibberish if they were not in secure mode. Assuming you had a phone system where you could switch from secure to not secure, if both sides forgot to turn on the encryption it might be a valid question, but if at least one side was encrypted, it would not be able to send or receive intelligibly (if you try to decode unencoded information, it will be gibberish). The last consideration would be if the message was encrypted end-to-end. It is plausible that within "a trusted network" the message is passed decrypted, especially in an analog system, to reduce the possibility of timing delays, etc. Based on the classification of the communication this may or may not be acceptable (require greater assurance if you are talking about a mole).

It is possible to say that a cellular connection or phone system is encrypted. GSM and CDMA have encryption capabilities; however, if you do not encrypt at the two endpoints, then you leave opportunities for interception, and the encryption of the network may not be sufficient to meet your needs.

Further reading:

Eric G
  • 9,691
  • 4
  • 31
  • 58