Home | History | Annotate | Download | only in doc

Lines Matching full:encryption

65        4.1.  Encryption . . . . . . . . . . . . . . . . . . . . . . . 19
76 5.1. Encryption: AES-CM and NULL. . . . . . . . . . . . . . . 29
134 SRTP provides a framework for encryption and message authentication
145 encryption, a keyed-hash based function for message authentication,
178 The word "encryption" includes also use of the NULL algorithm (which
324 The "Encrypted Portion" of an SRTP packet consists of the encryption
330 None of the pre-defined encryption transforms uses any padding; for
339 their padding. It is important to note that encryption transforms
351 new encryption
375 Portion of the SRTP packet. Thus, if both encryption and
376 authentication are applied, encryption SHALL be applied
392 cryptographic transform (e.g., encryption or message authentication),
413 context independently of the particular encryption or authentication
433 * an identifier for the encryption algorithm, i.e., the cipher and
468 session keys for encryption, and message authentication.
535 All encryption, authentication/integrity, and key derivation
614 the encryption algorithm indicated in the cryptographic context,
615 the session encryption key and the session salt (if used) found in
677 the cryptographic context, the session encryption key and salt (if
704 protection (Section 3.3.2), encryption (Section 4.1), message
865 report or a receiver report. However, the RTCP encryption prefix (a
867 since, as is stated there, it is only applicable to the encryption
919 The Encrypted Portion of an SRTCP packet consists of the encryption
924 RTCP packet, the E flag, and the SRTCP index (after any encryption
960 * Pre-defined SRTCP encryption is as specified in Section 4.1, but
962 section, and using the SRTCP index as the index i. The encryption
966 to be encrypted. SRTCP may have a different encryption transform
977 this feature is when the former has NULL-encryption and the latter
978 has a non NULL-encryption.
1044 While there are numerous encryption and message authentication
1052 4.1. Encryption
1055 encryption transforms specified in this section.
1060 * k_e is the session encryption key
1071 The encryption transforms defined in SRTP map the SRTP packet index
1102 Figure 3: Default SRTP Encryption Processing. Here KG denotes the
1108 to be used when encryption of RTP is not required.
1113 encryption starts immediately after the last reserved octet. The
1115 confused with the "encryption prefix" of [RFC3550, Section 6.1]), and
1117 keystream prefix MUST NOT be used for encryption. The process is
1127 The default cipher is the Advanced Encryption Standard (AES) [AES],
1177 SHALL be replaced by the SRTCP encryption session key and salt.
1188 packet that can be encrypted ensures the security of the encryption
1222 operation" RTP encryption. The AES f8-mode SHALL use the same
1379 encryption SHALL simply copy the plaintext input into the ciphertext
1436 Regardless of the encryption or message authentication transform that
1468 keys for encryption transforms, as is done in both of the pre-
1520 - k_e (SRTP encryption): <label> = 0x00, n = n_e.
1563 <label> = 0x03 for the SRTCP encryption key, <label> = 0x04 for the
1585 encryption AES-CM, NULL AES-f8 AES-CM
1603 5.1. Encryption: AES-CM and NULL
1606 4.1.1, SHALL be the default encryption algorithm. The default key
1607 lengths SHALL be 128-bit for the session encryption key (n_e). The
1673 encryption keys and salts, SRTP and SRTCP authentication keys), but
1717 The derived session salting key used in the encryption, has been
2119 the master key and, for encryption, the size of the salting key. Any
2127 their applicability to the encryption of Internet traffic is provided
2215 keystream (so that the encryption or decryption of one packet does
2220 revealed by the encryption. This means that it may be possible to
2267 that encryption algorithms, including AES Counter Mode and f8, do not
2345 surveillance. Encryption does not protect against this attack, and
2429 ordering (reversing it, or, placing FEC between SRTP encryption and
2649 [AES] NIST, "Advanced Encryption Standard (AES)", FIPS PUB 197,
2689 Encryption", NIST, http://csrc.nist.gov/encryption/modes/
2698 Concrete Treatment of Symmetric Encryption: Analysis of DES
2763 Security of KASUMI and 3GPP Encryption Mode f8",
2770 [MF00] McGrew, D. and S. Fluhrer, "Attacks on Encryption of
2976 cipher, which requires a 16 octet session encryption key and a 14
2993 concatenation of the encryption key label 0x00 with (index DIV kdr),
3030 concatenation of the encryption salt label. That value is padded and