Home | History | Annotate | Download | only in doc

Lines Matching full:salt

473    *  a master salt, to be used in the key derivation of session keys.
475 master salt is strongly RECOMMENDED, see Section 9.2. A "NULL"
476 salt is treated as 00...0.
603 3. Determine the master key and master salt. This is done using the
607 4. Determine the session keys and session salt (if they are used by
609 master salt, key_derivation_rate, and session key-lengths in the
615 the session encryption key and the session salt (if used) found in
652 3. Determine the master key and master salt. If the MKI indicator in
657 4. Determine the session keys, and session salt (if used by the
659 salt, key_derivation_rate and session key-lengths in the
677 the cryptographic context, the session encryption key and salt (if
1177 SHALL be replaced by the SRTCP encryption session key and salt.
1223 default sizes for session key and salt as AES counter mode.
1453 +-----------+ salt +--------+
1510 purposes. The n-bit SRTP key (or salt) for this packet SHALL then be
1518 The session keys and salt SHALL now be derived using:
1528 The master key and master salt MUST be random, but the master salt
1556 SRTCP SHALL by default use the same master key (and master salt) as
1608 default session salt key-length (n_s) SHALL be 112 bits.
1628 method for generating session keys. The default master salt length
1676 one master key (plus master salt when required), and then SRTP itself
1701 The master salt guarantees security against off-line key-collision
1719 ciphers, see Section 9.2. The explicit inclusion method of the salt
2021 master salt key
2022 length of the master salt 112 112
2023 n_s (session salt key length) 112 112
2134 be public. A salt size of (the suggested) size 112 bits protects
2894 salt key : 32f2870d
2945 Session Salt: F0F1F2F3F4F5F6F7F8F9FAFBFCFD0000 (already shifted)
2977 octet session salt, and an authentication function which requires a
2979 cipher key, the cipher salt, and the auth key in the following.
2986 and the 14 octet master salt:
2989 master salt: 0EC675AD498AFEEBB6960B3AABE6
2992 AES-CM is generated by exclusive-oring the master salt with the
3000 master salt: 0EC675AD498AFEEBB6960B3AABE6
3028 Next, we show how the cipher salt is generated. The input block for
3029 AES-CM is generated by exclusive-oring the master salt with the
3030 concatenation of the encryption salt label. That value is padded and
3035 master salt: 0EC675AD498AFEEBB6960B3AABE6
3044 cipher salt: 30CBBC08863D8C85D49DB34A9AE1
3051 master salt: 0EC675AD498AFEEBB6960B3AABE6