User guide
 
GOLANTECH         T:  + 9 7 2 -3 -6969690 |F: +972-3 -6969680
Encrypted Phones 
Golan encryption products consist of reliable plug-and-play components. 
We make it easy for network administrators and users to achieve device 
and network security in any enterprise or industrial data network. 
Military grade encryption for voice, text & file transfer. 
Unsecured communications can put your business and your life at risk.  
Government agencies, organizations, and even private individuals have all the tools 
and technology needed to intercept voice and data communications traffic. 
If you are concerned about your business secrets, or the health and safety of yourself 
and your loved ones, you must definitely take the steps necessary to protect your 
sensitive communication. 
Golan encryption is the preferred solution for thousands of users around the world.  
The reason for that is:  
Licensed by the Israeli Ministry of Defense, Golan encryption 3G is a world-class 
software-based solution providing military-grade encryption for voice and data 
communications. 
Golan encryption's triple layered security scheme turns your PC/laptop, Nokia phone 
or Windows mobile device into a military grade encrypted communicator, protected 
against any interception attempt by private, governmental or military entities. 
You can depend on Golan encryption to instantly encrypt your calls, file transfers and 
text messages even when making International calls. No VOIP provider is necessary. 
Protection is provided across all methods of Internet access including 3G, EDGE, 
GPRS, WI-FI and more. Moreover, Golan encryption is easy to use and the keys are 
auto- managed with no user intervention required. 
If you're not protecting your vital communications, you're transmitting financial, 
business and personal information in the clear. This opens you and your organization 
up to infiltration by criminals including industrial spies, kidnappers, terror organizations 
and other entities that do not have your best interests at heart.  
The encryption takes place when there is a conversation between two phones (at list) 
that has the program installed on. 
Before the conversation there is keys and codes recognition 
And then it is possible to talk in an encrypted way in 256 bit 
During the call it is possible to send an encrypted SMS 
  Compatible networks: WIFI, 3G,GPRS,EDGE,UMTS,CDMA 
  Algorithms: 16 Kbit authentication, Elliptic curve 384 bits, AES 256 bits , Diffie 
Hellman 4 Kbit 
  Bandwidth usage : standby mode 1kb per minute, secure call 250 kb per 
minute 
Compatible Networks: WI-FI, 3G, GSM, GPRS, EDGE, UMTS, CDMA 
Encryption Algorithms: 16,384 Bit Authentication, Elliptic Curve 384 Bits (RSA 7680 Bits 
Equivalent) AES 256 Bits, Diffie Hellman 4096 Bits 
International Calls: Full support for international calls and worldwide roaming 
Bandwidth Usage: Standby mode - 1 KB per Minute, Secure Call - 250 KB per Minute 
ENCRYPTED CELL PHONES 










