Tosh Defence
SECURE COMMUNICATIONS
SANKET

Sovereign Authenticated Network Key-based Encrypted Transmission

Classified. Sovereign. Unbreakable.

E2E
Signal Protocol Encryption
100%
Data Sovereignty
<1s
Flash Broadcast Delivery
0
Foreign Data Flows

MADE IN INDIA. FOR INDIA. FOR THE WORLD.

India's Indigenous Answer to WhatsApp and Telegram

WhatsApp stores your data on Meta's servers in the US. Telegram routes through servers in multiple foreign jurisdictions. Every message, every file, every call - subject to foreign law, foreign surveillance, and foreign corporate policy. SANKET is built entirely in India, hosted entirely on your infrastructure, and answerable to no foreign entity.

WhatsApp
Telegram
Signal
Slack
Microsoft Teams
SANKET

100% Data Sovereignty

Every byte of your data stays on Indian soil - on your own servers, under your own jurisdiction. No foreign government or corporation can access, subpoena, or intercept your communications.

Zero Foreign Dependencies

No foreign cloud services, no foreign APIs, no foreign CDNs. SANKET runs entirely on Indian infrastructure - government cloud or your own on-premise servers. Air-gapped if needed.

Complete Operational Independence

No foreign company can shut down your communications, revoke your licence, or push an update you haven't approved. You control the software, the servers, and the encryption keys.

Built and Maintained in India

Designed, engineered, and maintained by Indian engineers at Tosh Defence. Full source code available for sovereign audit. No black boxes, no offshore development, no foreign investors.

THE PROBLEM

Security forces and government agencies worldwide communicate sensitive operational information over public internet using consumer-grade apps - platforms that store data on foreign servers, have no organisational hierarchy, and provide zero audit trail for classified communications. SANKET changes that.

THE SOLUTION

What SANKET Does

SANKET is a military-grade secure messaging and information exchange platform built for defence forces, law enforcement, intelligence agencies, and any organisation that handles classified information. Every message, file, and call is end-to-end encrypted using Signal Protocol - the most cryptographically rigorous standard in the world, formally verified and used by defence forces globally.

SANKET can be hosted on your own cloud infrastructure or deployed on-premise at your facilities, ensuring complete data sovereignty under your jurisdiction. No foreign government, no foreign company, and no third party can access a single byte of your communications.

SANKET

संकेत (SANKET) - Signal. Code. Indication. Covert sign. Used in military contexts for covert signals between forces. The word IS communications - warm, approachable, and unmistakably Indian.

CAPABILITIES

Key Features

End-to-End Encryption

Signal Protocol with Perfect Forward Secrecy - every message uses a fresh key. No server can decrypt your communications, ever.

Organisation Hierarchy

Role-based access built around your command structure - Commander, Officer, Viewer. Not a generic enterprise org chart.

Flash Broadcast System

Four priority tiers: FLASH / IMMEDIATE / PRIORITY / ROUTINE. Mandatory read acknowledgements for critical orders. Auto-escalation if FLASH goes unread.

Classified File Vault

AES-256-GCM encrypted file sharing with sensitivity labels (Restricted / Confidential / Secret), digital watermarking, and access revocation.

Threat Monitoring Dashboard

Real-time anomaly detection - failed logins, unusual access patterns, off-hours activity. Full tamper-evident audit log of every action.

Complete Data Sovereignty

Hosted on your own servers or government cloud. No foreign infrastructure. No foreign data flows. Fully auditable at any time.

Certification Ready

Built with security certification pathways in mind - adaptable to your country's classified communication standards and compliance requirements.

Offline-Capable

Message queue persists and syncs on reconnect - works in forward areas with intermittent connectivity.

MULTILINGUAL SUPPORT

Available in 26 Languages

Every soldier, officer, and official uses SANKET in their own language. Full interface localisation - not just translation.

Indian Languages

हिन्दी

Hindi

বাংলা

Bengali

தமிழ்

Tamil

తెలుగు

Telugu

मराठी

Marathi

ગુજરાતી

Gujarati

ಕನ್ನಡ

Kannada

മലയാളം

Malayalam

ਪੰਜਾਬੀ

Punjabi

ଓଡ଼ିଆ

Odia

অসমীয়া

Assamese

English

English

Global Languages

العربية

Arabic

Français

French

Deutsch

German

Español

Spanish

Português

Portuguese

Русский

Russian

日本語

Japanese

한국어

Korean

中文

Chinese

ไทย

Thai

Tiếng Việt

Vietnamese

Türkçe

Turkish

Nederlands

Dutch

Italiano

Italian

More languages added continuously based on deployment requirements

SECURITY ARCHITECTURE

Built to Withstand Nation-State Adversaries

Every cryptographic primitive in SANKET is formally audited, compliant with DRDO SAG guidelines, and used by defence forces globally.

Key Agreement (1:1)

X3DH

Extended Triple Diffie-Hellman with ephemeral keys for Perfect Forward Secrecy

Message Ratchet

Double Ratchet

Unique encryption key generated for every single message - compromise of one reveals nothing else

Message Encryption

AES-256-GCM

Authenticated encryption - tampered messages are automatically rejected

Group Encryption

Sender Keys

Per-group encryption chain that rotates automatically when members leave

File Encryption

Double-Layer AES-256-GCM

Per-file random key + conversation key wrapping - even file names are encrypted

Key Derivation

HKDF-SHA256

Unique conversation key derived per group - following RFC 5869

Password Hashing

Argon2id

Memory-hard password hashing - winner of the Password Hashing Competition

Transport Security

TLS 1.3 Only

Certificate pinning enforced - man-in-the-middle attacks are blocked at the transport layer

Local Database Encryption

AES-256 Encrypted

Device database fully encrypted at rest with hardware-derived key material

Private Key Storage

Hardware-Backed Keychain

Private keys stored in hardware security module - never leave the secure chip

Two-Factor Authentication

TOTP (RFC 6238)

Time-based one-time passwords as a mandatory second factor

Random Number Generation

OS-Native CSPRNG

Cryptographically secure random number generation via OS hardware

Zero-Knowledge Server Design

Even with full database and storage access, the server cannot read a single message. All encryption and decryption happens exclusively on your device.

Server stores only encrypted blobs - cannot decrypt any message or file
Private keys never leave your device - stored in hardware security module
Conversation keys are derived client-side only - server has no key material
File names and MIME types are encrypted before upload - server sees no metadata
Full server compromise reveals zero plaintext - cryptographically guaranteed
No plaintext fallback - encryption failure blocks the message entirely

Threat Model - Who We Defend Against

Nation-State SIGINT

TLS 1.3 transport encryption plus end-to-end AES-256-GCM. Double Ratchet ensures Perfect Forward Secrecy - past messages safe even if current keys are compromised.

Compromised Server

Zero-knowledge architecture. Server stores only ciphertext blobs - no key material, no plaintext, no file metadata. Full database access reveals nothing.

Rogue CA / MITM Attack

Certificate pinning enforced at the application layer. Connections to servers with unexpected certificates are blocked before any data is transmitted.

Compromised Device

Private keys stored in hardware security module. Local database fully encrypted at rest. Tamper detection on key material integrity.

Insider Threat (Server Admin)

End-to-end encryption excludes the server from the trust boundary entirely. Admin sees encrypted blobs - same as an external attacker.

Physical Device Seizure

Hardware-backed key protection. Encrypted local database. Admin-gated device trust approval - seized devices can be revoked instantly.

Audited Cryptographic Libraries

End-to-End Encryption LibrariesTrail of Bits / Cure53
iOS Native CryptographyFIPS 140-2 Validated
Android Native CryptographyNCC Group / Cure53
Password HashingPHC Winner - Academic Review
Local Database EncryptionIndependent Security Audits
Hardware Key StoragePlatform-Certified (Apple / Google)

DRDO SAG Compliance

RequirementAlgorithmStatus
Symmetric CipherAES-256-GCM
Hash FunctionSHA-256 / SHA-512
Key ExchangeX3DH (X25519)
Digital SignatureEd25519
Key DerivationHKDF-SHA256
Password HashingArgon2id
TLS VersionTLS 1.3 Only
Perfect Forward SecrecyDouble Ratchet + ECDHE
Key StorageHardware Security Module
Random NumbersOS-Native CSPRNG

DEPLOYMENT OPTIONS

Product Tiers

Sanket.Work

Hosted on government or private cloud. Fast deployment, no infrastructure overhead. For units needing rapid operational capability.

Sanket.OnPrem

Deployed on your own servers. Air-gap capable. Full data isolation. For facilities requiring the highest classification handling.

Sanket.Field

Phase 3

Offline-first variant for forward operating bases. Works on local mesh network with zero internet.

WHY NOT A FOREIGN ALTERNATIVE?

Why SANKET?

Foreign Secure Messengers
SANKET
Data sovereignty
Foreign servers, foreign law
Your servers, your jurisdiction
Security certification
Limited to vendor's country
Adaptable to your national standards
Organisation hierarchy
Generic enterprise roles
Rank-based command structure
Air-gap deployment
Partial
Built-in from Day 1
Source code access
Closed source, no audit
Full source code available for audit

Your classified communications should never leave your jurisdiction. SANKET ensures they don't.

INTEGRATION

Works With

Government cloud or private on-premise servers
Organisation command hierarchy systems
National security certification frameworks
Offline mesh networking (Phase 3)
Audit and compliance frameworks

DESIGNED FOR

Who It Serves

Armed Forces
Police and Paramilitary
Intelligence Agencies (NIA, CBI, ED)
Government Ministries
Private Security Organisations

Proudly Made in India

Engineered in India with world-class standards. Deployable anywhere in the world. Full source code available for sovereign audit. No vendor lock-in. No foreign dependencies.

Ready to See SANKET in Action?

Working prototype available within 30 days. Schedule a live demo with our team tailored to your operational requirements. Anywhere in the world.