Common Technology Standards

Common Technology Standards

‘Information security’ is an umbrella term for aspects of security covering the availability, integrity, authenticity and confidentiality of digital data. Multi-stakeholder cooperation is essential for ensuring information security of our interconnected global digital economy and society. Even the most capable nation state, government organisation, large or small, simply cannot hope to anticipate and fend off all cyber-attacks without multi-stakeholder cooperation.

At Secure Chorus, we foster multi-stakeholder cooperation and work with governments and the global information security industry to raise the information security baseline for a safer digital economy. We achieve this by bringing together organisations from the information security sector that share our vision of the importance of developing an ecosystem of secure, interoperable and regulatory compliant information security technologies.

New information security technologies are launched onto the market every day, but for the most part these private sector offerings tend to be concentrated more on their potential to make a commercial profit rather than making them compatible with other technologies. This lack of interoperability is one of the reasons the global digital economy currently lacks an adequate information security baseline.

Since our formation, the Secure Chorus vision has been to develop with our Members an ecosystem of secure, regulatory compliant and interoperable information technology solutions. It was clear that this could only be achieved by having the relevant stakeholders agreeing to develop common interoperability standards.

Secure Chorus Interoperability Standards build upon well-defined and industry-wide adopted standards in the field of cryptography, telecommunication and multimedia. While Secure Chorus Interoperability Standards have adopted MIKEY-SAKKE as the core encryption algorithm, the standards also define other protocols and codecs that Secure Chorus Compliant Products must support.

MIKEY-SAKKE has been developed by the UK government’s National Technical Authority for Information Assurance (CESG), which is now part of the National Cyber Security Centre (NCSC), a government member of Secure Chorus. MIKEY-SAKKE was made into an open standard by the Internet Engineering Task Force (IEFT). It has also recently been approved by the 3rd Generation Partnership Project (3GPP), the body responsible for standardising mobile communications for use in critical applications, hence receiving endorsement at global level for its approach to public key cryptography.

Our approach extends to all types of digital data. The foundation of Secure Chorus Interoperability Standards specifically addresses and resolves the problem of achieving interoperability of two secure voice products, with the aim of achieving seamless secure phone calls and beyond. Secure Chorus continues to work with its Members to define new standards according to an agreed technology roadmap. This is developed through consultation with our Standards Committee, ensuring the development of new standards is well aligned with market trends and drivers.

Current areas of work include extending the VoIP standards beyond one-to-one communication to group calls, instant messaging, video calls, voicemail, document sharing and machine-to-machine communications. Secure Chorus is also studying and analysing other areas of innovation such as the development of quantum computing resistance cryptography standards, with a Post Quantum Identity Based Crypto Scheme scheduled for the near future.

Access to Secure Chorus Interoperability Standards

Secure Chorus Interoperability Standards are made available only to our Members and Observers. In exceptional cases, if approved by the Secure Chorus board of directors, they may be made available to the wider public.

Reference library

A reference source-code library has been made available through two code repositories on the Bitbucket code collaboration platform.

Click here to access this reference library. All code in the linked repositories is Crown Copyright 2015, unless otherwise marked. Note: you will leave the Secure Chorus website.

Start typing and press Enter to search