Radio
- GSM quad-band 850/900/1800/1900 MHz
- UMTS HSDPA/WCDMA 900/2100 MHz with HSUPA support
- Up to 2 Mbps uplink, up to 7 Mbps downlink speed
Voice Encryption
- Secure voice over IP communication on any network – GSM, 3G, WLAN
- strongest and most secure algorithms available today – AES256 and Twofish
- 4096 bit Diffie-Hellman key exchange with SHA256 hash function
- readout-hash based key authentication
- 256 bit effective key length
- encryption key is destroyed as soon as the call ends
Message Encryption
Based on the same strong encryption algorithms used for TMP CryptoPhone voice encryption – 4096 bit Diffie-Hellman initial key exchange, AES256 and Twofish message encryption with 256 bit effective key length. Supports long SMS and encrypted self-destructing "Eyes Only" SMS.
Device Protection
Encrypted storage system for contacts, messages, notes and keys with smart folders protects confidential data against unauthorized access
- hardened WM 6.5 operating system with granular security management and streamlined, security optimized components and communication stacks protects device against outside attacks.
|
TMP CryptoPhones are the only secure mobile phones on the market with full source code published for independent security assessments.
They contain no »proprietary« or »secret« encryption, no backdoors, no key-escrow, no centralized or operator-owned key generation, and require no key registration.
Interoperability
Fully compatible with all TMP CryptoPhone IP mobile, satellite and fixed-line encryption products
- IP PBX integration with virtual extensions
Trustworthy Voice & SMS Encryption
The CryptoPhone 400 comes with full source code available for independent review. Finally, you can perform an independent assessment to ensure that you can rely on strong encryption without any backdoors in the communications device that you entrust your security to. The TMP CryptoPhone 400 enables you to put the trust where it belongs – in a trustworthy, open and scientific verification process.
TMP CryptoPhone technology is based on well-researched algorithms for both encryption and voice processing. It features the strongest encryption available combined with key lengths that provide peace of mind today and in the future. |