News: Want to hide your internet traffic from prying eyes? Try these encryption tools for mobile.

Research has revealed that more and more internet traffic is being encrypted, with 70 percent of global traffic set to be encrypted across 2016. However, encryption is lagging slightly on the mobile internet, which currently has around 60 percent encryption.

Usually encryption is carried out at the discretion of the internet company which is providing a given service. For example, WhatsApp notably encrypts all communications carried across the service.

However, for those mobile phone owners that wish to take matters into their own hands, there are a range of tools that are available now.

CBR rounds them up in this list.

1. Gold Lock 3G

Licensed by the Israeli Ministry of Defense, Gold Lock 3G aims to provide military-grade encryption for both voice and data communications.

It does not require VoIP capabilities and will automatically encrypt calls, file transfers and text messages, including internationally. This encryption works across cellular, GPRS and wi-fi.

The company boasts that it provides triple-layered security and the solution can be used on iPhone, Android and BlackBerry.

Founded in 2003, the Israel-based company employs over 30 specialists, including security software developers, tactical mathematicians and analysers. As well as providing its mobile encryption products, it also builds custom security solutions for several government and military organisations.

2. Cellcrypt

The company uses double-layer AES-256 and RC4-384 to provide a new key for each call or text message.

Cellcrypt has its own VoIP infrastructure, which allows the caller to use a low data rate. So that the calls don’t hog your bandwidth, the calls use narrow band adaptive voice codec.

It operates over all major types of network, including mobile, satellite and wi-fi, and works on iOS, Android, BB10, Windows 8.1 and PBX. A desktop version is set to be available soon.

Customers will have access to Cellcrypt’s secure PBX Service. This gateway integrates Private Branch Exchnages with the Cellcrypt NG-compatible end-point encryption. Cellcrypt NG-enabled smartphones can connect to landlines and use functionalities such as voicemail and call-forwarding.

The Secure Conferencing solution allows multiple parties to connect securely on a secure conference bridge.

Verizon is working with Cellcrypt to offer the Voice Cypher Ultra product.

3. KoolSpan

KoolSpan has a patented mobile encryption engine which authenticates and secures all communications.

The engine runs on standard smartphones and network-connected devices; the engine is run either in the native secure elements of the phone, or on a TrustChip microSD memory card.

It can also be run in Trustonic’s Trusted Execution Environment, which is a secure area that uses the phone’s application processor.

The solution is compatible with Android, iPhone and BlackBerry phones.

4. PhoneCrypt

PhoneCrypt claims to offer military-grade encryption with RSA 4096 bit & AES 256-bit encryption. This is the same technology used by the FBI and CIA.

The software can run across internet connectivity through 3G, UMTS, HSPA, W-CDMA, EDGE, GPRS and wi-fi, and is compatible with both landline and mobile phones. It works in real-time and does not affect the phone’s functioning.

The calls that you place through the software are free, using only the carrier’s data package. It can therefore also be used for long-distance and international calls.

It works by generating a new encryption key automatically before every call. This single combination is modified every 4 seconds and prevents your communication from being intercepted.

Secure data is never saved on the device and the user isn’t required to do anything. It uses less than 150 Mhz of processing power meaning it won’t drain your battery too much.

In terms of industry the solution mainly targets consulting & engineering, healthcare & insurance, finance & legal, government & law enforcement and manufacturing & suppliers.

5. Orbot

The Tor project has made its name through the desktop browser, which uses a form of onion routing. This is more secure than simple encryption, as it first encrypts then bounces the traffic at random around the world through a volunteer network of routers.

Android users can install the Orbot package, an application designed to allow mobile users to access the web, instant messaging and email without any tracking or blocking.

It contains Tor and libevent, which provides a local HTTP proxy and the standard SOCKS4A/SOCKS5 proxy interfaces into the Tor network.

It can be installed from an F-Droid repository, the Android Market or manually from Guardian’s website.

All of the source code is available in the Orbot git repository, but Tor notes that this might not always give you the latest stable Tor version.