Secure is the New Black: The Evolution of Secure Mobile Technology for Government Agencies


Recommended Posts

Secure is the New Black: The Evolution of Secure Mobile Technology for Government Agencies
Full article: http://www.federaltechnologyinsider.com/secure-new-black-evolution-secure-mobile-technology-government-agencies/

This article is somewhat old . . . but it was recently shared by the Trusted Computing Group on July 28, 2014. It is currently on the front page.


The CSD 3324 telephone and fax system has provided the Department of Defense (DoD) with secure voice and fax communications for years. Using the AES 256-bit encryption algorithm and the Diffie-Hellman key exchange, this old work horse ensures that all messages get through safely. So if outdated voice and fax technology can be secure, then why can?t mobile devices?

For years in the DoD, desktops have been protected by technology known as trusted computing. At first highly mobile laptops like the Samsung Chrome Book or the Sony Ultra Book had the Trusted Platform Module (TPM) chip embedded on the motherboard.  But now virtually every laptop has a TPM chip that is enabled in the operating system.

. . .

In its simplest form, a TPM mobile chip provides a secure storage location for certificates and encryption keys that is separate from other memory. Experts warn that TPM is not a panacea and must be used in conjunction with other security measures such as malware and anti-virus protection, whole disk encryption, and strong passwords or two-factor authentication.

Link to comment
Share on other sites

This topic is now closed to further replies.