9
Attribute Description
Hardware encryption algorithm
Key algorithms: DES, 3DES, AES
Authentication algorithms: HMAC-MD5-96, HMAC-SHA-1-96
VPM and VCPM Module
VPM (Voice Processing Module) functions to implement the encryption/decryption, EC and CNG of
voices.
VCPM (Voice Co-Processing Module) processes the voice data in combination with VPM.
•
Voice co-processing module (RT-VCPM)
•
8-channel voice processing module (RT-VPM8)
•
16-channel voice processing module (RT-VPM16)
•
24-channel voice processing module (RT-VPM24)
•
32-channel voice processing module (RT-VPM32)
NOTE:
VPM/VCPM is only available on MSR 20-40.