Alcatel prepares IP scrambler-phone

Alcatel is developing the IP equivalent of a scrambler-phone, in an effort to win ultra-cautious users over to IP telephony. It...

Alcatel is developing the IP equivalent of a scrambler-phone, in an effort to win ultra-cautious users over to IP telephony. It says current security schemes for IP may not satisfy the needs of some government departments or large businesses.

Based on Alcatel's OmniPCX Enterprise IP communication server and due next year, the system will use Mistral hardware encryption modules from Thales to provide wirespeed encryption. These will be integrated everywhere from the IP trunk to the IP phone, said Alcatel solutions marketing manager Neil Tilley.

"Some sectors I talk to do not think the standards stuff is enough, especially in banking and defence - they want special encryption tools," he said.

"When the banking infrastructure of a country could depend on a conversation not being overheard, you have to show them physical separation from what everyone else is doing. A lot of companies have confidence in IPsec, but it has been around for a while and there are issues - with certificate management, for instance."

However, users seeking secure telephony should not get hung up on the type of encryption used, said Vincent Bieri, Cisco Systems' regional marketing manager for security.

"Encryption is not a magic technology to solve all problems. It can provide privacy and authentication, but it cannot guarantee no-one has had physical access," he said.

"In terms of breaking encryption, brute-forcing triple-DES has never been a success. The only way to break it is to get access to the keys, so physical infrastructure security is vital."

Tilley agreed, pointing out that strong encryption only forms part of a complete security process. He noted that the Thales modules use key auto-generation at all IP endpoints, thereby providing authentication and integrity without the complexity of certificate management.

"The bottom line is voice server security versus Dos attacks, for example," he said. "Then it is network security, through authenticated VLans and so on, on top of that there is management security, and on top of that, communications security."

Bryan Betts writes for

Read more on IT strategy

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.