Tubitak2

TUBITAK – 2

In this project, it is planned to develop a communication system that will provide an end-to-end secure and smooth communication and data transfer on mobile terminals called smart devices. This communication system will support secure voice communication, text messaging and file sharing. A distributed central server system will be developed for mobile terminals with different operating systems.

Project Title Designing and Developing an End-to-End Secure Communication System on Mobile Terminals by Using Cryptographic Methods
Call 1511 – Research Technology Development and Innovation Projects in Priority Areas G. P.
Status Ongoing
Duration 24 Months
Partner Oran Technology
Sectors ICT, Telecommunication
Total Budget 847.930,78 USD

 

In this project, it is planned to develop a communication system that will provide an end-to-end secure and smooth communication and data transfer on mobile terminals called smart devices. This communication system will support secure voice communication, text messaging and file sharing.  A distributed central server system will be developed for mobile terminals with different operating systems.
In order to provide the end-to-end security, cryptographic methods are going to be used. For this purpose, internationally audited cryptographic algorithms and protocols are going to be used in the background of the protocol that will be developed within the project. In this project, following tasks will be achieved; 1.  Mobile communication software for different mobile terminals with different OEMs. 2.  Software infrastructure for central management server that enables communication between each client 3.  Integration of cryptographic modules that are in accordance with international standards 4.  Development of appropriate cryptographic protocol to mobile communications infrastructure a.  Designing hybrid cryptographic protocol b.  Cryptographic key generation and exchange  c.  Integration of PKI to communication platform 5.  Providing an end-to-end communication security independent from the central server with cryptographic methods.