Lines Matching refs:encryption
132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
175 The word "encryption" includes also use of the NULL algorithm (which
319 The "Encrypted Portion" of an SRTP packet consists of the encryption
325 None of the pre-defined encryption transforms uses any padding; for
334 their padding. It is important to note that encryption transforms
345 new encryption transform needs to carefully consider and describe the
369 Portion of the SRTP packet. Thus, if both encryption and
370 authentication are applied, encryption SHALL be applied
386 cryptographic transform (e.g., encryption or message authentication),
406 context independently of the particular encryption or authentication
426 * an identifier for the encryption algorithm, i.e., the cipher and
460 session keys for encryption, and message authentication.
526 All encryption, authentication/integrity, and key derivation
604 the encryption algorithm indicated in the cryptographic context,
605 the session encryption key and the session salt (if used) found in
666 the cryptographic context, the session encryption key and salt (if
692 protection (Section 3.3.2), encryption (Section 4.1), message
850 report or a receiver report. However, the RTCP encryption prefix (a
852 since, as is stated there, it is only applicable to the encryption
903 The Encrypted Portion of an SRTCP packet consists of the encryption
908 RTCP packet, the E flag, and the SRTCP index (after any encryption
944 * Pre-defined SRTCP encryption is as specified in Section 4.1, but
946 section, and using the SRTCP index as the index i. The encryption
950 to be encrypted. SRTCP may have a different encryption transform
960 this feature is when the former has NULL-encryption and the latter
961 has a non NULL-encryption.
1026 While there are numerous encryption and message authentication
1037 encryption transforms specified in this section.
1042 * k_e is the session encryption key
1053 The encryption transforms defined in SRTP map the SRTP packet index
1089 to be used when encryption of RTP is not required.
1094 encryption starts immediately after the last reserved octet. The
1096 confused with the "encryption prefix" of [RFC3550, Section 6.1]), and
1098 keystream prefix MUST NOT be used for encryption. The process is
1157 SHALL be replaced by the SRTCP encryption session key and salt.
1168 packet that can be encrypted ensures the security of the encryption
1201 operation" RTP encryption. The AES f8-mode SHALL use the same
1355 encryption SHALL simply copy the plaintext input into the ciphertext
1411 Regardless of the encryption or message authentication transform that
1443 keys for encryption transforms, as is done in both of the pre-
1494 - k_e (SRTP encryption): <label> = 0x00, n = n_e.
1536 <label> = 0x03 for the SRTCP encryption key, <label> = 0x04 for the
1558 encryption AES-CM, NULL AES-f8 AES-CM
1578 4.1.1, SHALL be the default encryption algorithm. The default key
1579 lengths SHALL be 128-bit for the session encryption key (n_e). The
1644 encryption keys and salts, SRTP and SRTCP authentication keys), but
1687 The derived session salting key used in the encryption, has been
2082 the master key and, for encryption, the size of the salting key. Any
2090 their applicability to the encryption of Internet traffic is provided
2177 keystream (so that the encryption or decryption of one packet does
2182 revealed by the encryption. This means that it may be possible to
2228 that encryption algorithms, including AES Counter Mode and f8, do not
2387 ordering (reversing it, or, placing FEC between SRTP encryption and
2642 Encryption", NIST, http://csrc.nist.gov/encryption/modes/
2924 cipher, which requires a 16 octet session encryption key and a 14
2941 concatenation of the encryption key label 0x00 with (index DIV kdr),
2977 concatenation of the encryption salt label. That value is padded and