MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

RokaCom - Ideal for Secure Phone Conversations

Published on 15 December 14

Today’s dynamic and rapidly changing digital landscape poses a serious threat to phone users’ privacy. Understanding the implications of specific technologies is a must. Most VoIP applications are insecure and have inherent security risks. RokaCom is an ideal way to address these security concerns and to keep your conversations private.

The data in the majority of VoIP applications is not protected from eavesdropping or modification. The Real-time Transfer Protocol (RTP) is often utilized and it has seen increased use with the ever-growing use of Voice over IP (VoIP) and other media applications. These protocols are the workhorse for VoIP applications. It is important to note that these applications send RTP data over the public Internet in the clear.

Is there a way to tackle these security issues? Yes, the answer is RokaCom - a service for mobile devices that secures and encrypts communication between users. This secure mobile application service puts you back in control of your data. The service makes use of military grade AES 256 encryption through ZRTP.

So why ZRTP?

The architecture of ZRTP is superior to alternative approaches to secure VoIP. ZRTP uses a Diffie-Hellman key agreement, a mathematical technique to generate a random password for a call. An incomplete mathematical equation is created by one phone and then sends it to the other phone. Both phones decrypt the information and both find the same result by solving the equations together. This results in a secure pair of passwords. No transmission of passwords is needed.

Updated cryptographic features in the ZRTP protocol supersedes other technologies and avoids the public key infrastructure (PKI) complexities, even though it uses a public key algorithm. In fact, it does not use persistent public keys at all. The ephemeral Diffie-Hellman with hash commitment is capable of detecting man-in-the-middle (MiTM) attacks. Users verbally compare the displayed short authentication string on the screen, and when they match the users can be assured the link is secure. Forward secrecy is assured as the keys are destroyed at the end of the call.

ZRTP protocol is extremely secure and does not rely on any servers or on SIP signaling for the key management. All operations are in-band and handled over the ZRTP connection once established. A key difference is that ZRTP negotiates keys directly between the two devices, not to the server. This allows the channel to be encrypted all the way through to the other device. ZRTP feeds the raw entropy pool with an audio voice sample, thereby increasing the strength of the entropy generation system.

RokaCom makes use of ZRTP for End-to-End Encryption, ensuring no one, not even employees at RokaCom, can eavesdrop on your conversations. The sole aim is to offer truly private communications. The service comes with the highest security and privacy possible. Only the people on the call or chat session can decrypt the message. RokaCom keeps your conversations private.

RokaCom - Ideal for Secure Phone Conversations - Image 1
This blog is listed under Networks & IT Infrastructure , IT Security & Architecture and Mobility Community

Post a Comment

Please notify me the replies via email.

  • We hope the conversations that take place on will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in
Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url