en.unionpedia.org

Secure Real-time Transport Protocol, the Glossary

Index Secure Real-time Transport Protocol

The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications.[1]

Table of Contents

  1. 39 relations: Advanced Encryption Standard, Asterisk (PBX), Authentication, Blink (browser engine), Block cipher, Block cipher mode of operation, Chromium (web browser), Cipher, Cisco, Cryptography, Data integrity, Datagram Transport Layer Security, Ericsson, Gecko (software), HMAC, Identity function, Internet Engineering Task Force, Internet Protocol, Internet Standard, Key derivation function, Key size, Message authentication code, MIKEY, Multicast, Opera (web browser), Real-time Transport Protocol, Replay attack, Request for Comments, RTP Control Protocol, Salt (cryptography), SDES, Stream cipher, Trident (software), Unicast, Virtual private network, Vivaldi (web browser), WebKit, ZRTP, 3G.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

See Secure Real-time Transport Protocol and Advanced Encryption Standard

Asterisk (PBX)

Asterisk is a software implementation of a private branch exchange (PBX).

See Secure Real-time Transport Protocol and Asterisk (PBX)

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user.

See Secure Real-time Transport Protocol and Authentication

Blink is a browser engine developed as part of the free and open-source Chromium project.

See Secure Real-time Transport Protocol and Blink (browser engine)

Block cipher

In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks.

See Secure Real-time Transport Protocol and Block cipher

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity.

See Secure Real-time Transport Protocol and Block cipher mode of operation

Chromium (web browser)

Chromium is a free and open-source web browser project, primarily developed and maintained by Google.

See Secure Real-time Transport Protocol and Chromium (web browser)

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

See Secure Real-time Transport Protocol and Cipher

Cisco

Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California.

See Secure Real-time Transport Protocol and Cisco

Cryptography

Cryptography, or cryptology (from κρυπτός|translit.

See Secure Real-time Transport Protocol and Cryptography

Data integrity

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.

See Secure Real-time Transport Protocol and Data integrity

Datagram Transport Layer Security

Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed to prevent eavesdropping, tampering, or message forgery. Secure Real-time Transport Protocol and datagram Transport Layer Security are cryptographic protocols.

See Secure Real-time Transport Protocol and Datagram Transport Layer Security

Ericsson

Telefonaktiebolaget LM Ericsson, commonly known as Ericsson, is a Swedish multinational networking and telecommunications company headquartered in Stockholm.

See Secure Real-time Transport Protocol and Ericsson

Gecko (software)

Gecko (stylized as ɢecko) is a browser engine developed by Mozilla.

See Secure Real-time Transport Protocol and Gecko (software)

HMAC

In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

See Secure Real-time Transport Protocol and HMAC

Identity function

Graph of the identity function on the real numbers In mathematics, an identity function, also called an identity relation, identity map or identity transformation, is a function that always returns the value that was used as its argument, unchanged.

See Secure Real-time Transport Protocol and Identity function

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) is a standards organization for the Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP).

See Secure Real-time Transport Protocol and Internet Engineering Task Force

Internet Protocol

The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

See Secure Real-time Transport Protocol and Internet Protocol

Internet Standard

In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet.

See Secure Real-time Transport Protocol and Internet Standard

Key derivation function

In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher).

See Secure Real-time Transport Protocol and Key derivation function

Key size

In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher).

See Secure Real-time Transport Protocol and Key size

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message.

See Secure Real-time Transport Protocol and Message authentication code

MIKEY

Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. Secure Real-time Transport Protocol and MIKEY are cryptographic protocols.

See Secure Real-time Transport Protocol and MIKEY

Multicast

In computer networking, multicast is a type of group communication where data transmission is addressed to a group of destination computers simultaneously.

See Secure Real-time Transport Protocol and Multicast

Opera (web browser)

Opera is a multi-platform web browser developed by its namesake company Opera.

See Secure Real-time Transport Protocol and Opera (web browser)

Real-time Transport Protocol

The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks.

See Secure Real-time Transport Protocol and Real-time Transport Protocol

Replay attack

A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed.

See Secure Real-time Transport Protocol and Replay attack

A Request for Comments (RFC) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF).

See Secure Real-time Transport Protocol and Request for Comments

RTP Control Protocol

The RTP Control Protocol (RTCP) is a binary-encoded out-of-band signaling protocol that functions alongside the Real-time Transport Protocol (RTP).

See Secure Real-time Transport Protocol and RTP Control Protocol

Salt (cryptography)

In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase.

See Secure Real-time Transport Protocol and Salt (cryptography)

SDES

SDES (Session Description Protocol Security Descriptions) for Media Streams is a way to negotiate the key for Secure Real-time Transport Protocol.

See Secure Real-time Transport Protocol and SDES

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

See Secure Real-time Transport Protocol and Stream cipher

Trident (software)

Trident (also known as MSHTML) is a proprietary browser engine for the Microsoft Windows version of Internet Explorer, developed by Microsoft.

See Secure Real-time Transport Protocol and Trident (software)

Unicast

Unicast is data transmission from a single sender (red) to a single receiver (green). Other devices on the network (yellow) do not participate in the communication. In computer networking, unicast is a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.

See Secure Real-time Transport Protocol and Unicast

Virtual private network

Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not controlled by the entity aiming to implement the VPN) or need to be isolated (thus making the lower network invisible or not directly usable).

See Secure Real-time Transport Protocol and Virtual private network

Vivaldi (web browser)

Vivaldi is a freeware, cross-platform web browser with a built-in email client developed by Vivaldi Technologies, a company founded by Tatsuki Tomita and Jon Stephenson von Tetzchner, who was the co-founder and CEO of Opera Software.

See Secure Real-time Transport Protocol and Vivaldi (web browser)

WebKit

WebKit is a browser engine primarily used in Apple's Safari web browser, as well as all web browsers on iOS and iPadOS.

See Secure Real-time Transport Protocol and WebKit

ZRTP

ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over IP (VoIP) phone telephony call based on the Real-time Transport Protocol. Secure Real-time Transport Protocol and ZRTP are cryptographic protocols.

See Secure Real-time Transport Protocol and ZRTP

3G

3G is the third generation of wireless mobile telecommunications technology.

See Secure Real-time Transport Protocol and 3G

References

[1] https://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol

Also known as SRTCP, SRTP Interoperability, Secure RTCP, Secure RTP, Secure Real-Time Transport Control Protocol.