blob: 2ec9d43782c58a368c456bcc6ef96b11038d6b4f [file] [log] [blame]
Param Reddappagari386ce4d2011-10-04 12:15:40 -07001SRTP and ICM References
2September, 2005
3
4This document provides references for the various cryptographic
5functions used in libSRTP and libaesicm.
6
7Secure RTP is defined in RFC 3711, which is included in this
8distribution for convenience. The counter mode definition is in
9Section 4.1.1 of the SRTP draft.
10
11SHA-1 is defined in FIPS-180-1, available online at the NIST website.
12
13HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available
14in RFC2202, which are available online at http://www.ietf.org/rfc/
15
16ICM is defined by draft-irtf-cfrg-icm-00.txt, and its application in
17ISMAcryp (the Internet Streaming Media Alliance 1.0 Encryption and
18Authentication) is defined in that specification. It is available
19from http://www.isma.tv/.
20
21