Microcrypt Technologies Ltd.


The device for creation of the protected data channel through networks of common use (for example Internet).

The IP-encryptor allows:

  • To join LAN of remote offices in a common network with observance of the data confidentiality transmitted through an open network;
  • To connect portable workstations to information center (server) through the protected tunnel.

The protection of network transmitted data is realized by enciphering of IP packets that go through an open network.


    • intended for operation in Ethernet networks corresponding to group of standards IEEE 802.3;
    • includes the hardware generator of arbitrary sequences for creation of reliable keys of enciphering;
    • uses mutual authentification of subscriber devices on the basis of certificates of public keies;
    • compatibility with an infrastructure of public keies for handle of certificates;
    • connecting of smart cards for storage of personal keys of authentification;
    • embedded Web-interface for remote customisation and monitoring;
    • usage of cryptography algorithms GOST 28147-89, GOST 34.311-95, DSTU 4145-2002, being standards in Ukraine;
    • functions of the traffic routeing;
    • monitoring of integrity of embedded software, protection from modification.



  • transfer rate - up to 140 Mbit/sec;
  • used algorithms of enciphering
  • AES-128/192/256, GOST 28147-89;
  • used hashing algorithms: SHA-256/384/512, GOST 34;
  • algorithms used for authentification: RSA, DSTU 4145-2002;
  • power-line supply of alternating single-phase current 100-240 V 50-60 Hz;
  • range of operation temperatures 0-60 °С, relative humidity of 5-95 %;
  • interfaces Ethernet (10/100Base-T) with slot 8P8C (RJ-45).


  • usage of enciphering algorithms DES, Triple DES, CAST 128, Blowfish, IDEA, RC4, RC5;
  • usage of hashing algorithms: MD5, RMD-160, MDC2, SHA, SHA-1;
  • usage for authentification of algorithms: DSA, ECDSA;
  • function of the internetwork screen;
  • function IDS/IPS
  • Wi-Fi module supporting operation in wireless networks corresponding to standard IEEE 802.11g.
  • interface Ethernet (10/100/1000Base-T) with slot 8P8C (RJ-45).

Others advantages:

  • Simplicity of implantation of protection solution from breach in an existing network infrastructure of the organization;
  • Absence of  moving element in the device case and implimantation of passive system of cooling, and  also a complete set of solid-state disk drive ensures high dependability of the device;
  • Application of the specialised processor for performance of cryptography conversions ensures high-speed metrics, much exceeding metrics of software solutions on the basis of modern all-purpose processors;
  • Possibility of backup of devices in a condition of automatic check of refusal and changeover to standby facility;
  • Possibility of usage of the device for "network-trap" creation (HoneyNet).

The product can be adapted to the requirements of the customer following the agreement of specification.