1 SRTP and ICM References 2 September, 2005 3 4 This document provides references for the various cryptographic 5 functions used in libSRTP and libaesicm. 6 7 Secure RTP is defined in RFC 3711, which is included in this 8 distribution for convenience. The counter mode definition is in 9 Section 4.1.1 of the SRTP draft. 10 11 SHA-1 is defined in FIPS-180-1, available online at the NIST website. 12 13 HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available 14 in RFC2202, which are available online at http://www.ietf.org/rfc/ 15 16 ICM is defined by draft-irtf-cfrg-icm-00.txt, and its application in 17 ISMAcryp (the Internet Streaming Media Alliance 1.0 Encryption and 18 Authentication) is defined in that specification. It is available 19 from http://www.isma.tv/. 20 21 22