ProVerif Analysis of the ZRTP Protocol

  • Bresciani R
  • Butterfield A
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used. This protocol does not provide en-cryption, so it is necessary to use Secure RTP (SRTP) to secure the communication. In order for this to work, the agents need to agree on key material and ZRTP provides them with a procedure to perform this task: it is a key agreement protocol, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint certificates. This is an analysis of the ZRTP protocol performed with ProVerif, which tests security properties; in order to perform the analysis, the protocol has been modeled in the applied π-calculus.

Cite

CITATION STYLE

APA

Bresciani, R., & Butterfield, A. (2010). ProVerif Analysis of the ZRTP Protocol. International Journal for Infonomics, 3(3), 306–313. https://doi.org/10.20533/iji.1742.4712.2010.0033

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free