…RTP, since it is possible to use a NULL encryption algorithm. As described in [ RFC7201 ], the strength of SRTP data origin authentication depends on the cryptographic transform and key management used. For example, in group communication, where it is sometimes possible to authen…
…RTP, since it is possible to use a NULL encryption algorithm. As described in [ RFC7201 ], the strength of SRTP data origin authentication depends on the cryptographic transform and key management used. For example, in group communication, where it is sometimes possible to authen…
…ty mechanisms and important considerations in Options for Securing RTP Sessions RFC7201 ]. Applications SHOULD use one or more appropriate strong security mechanisms. The rest of this security consideration section discusses the security impacting properties of the payload format…
… also other methods exist as discussed in "Options for Securing RTP Sessions" [ RFC7201 ]. Most of the methods for securing RTP, however, do not provide source authentication of each individual participant in a multiparty use case. In case one of the session participants is malic…