CONTENTS

 1     Scope          
        1.1     Connection model       
 
2     References
 3     Definitions 
        3.1     Terms defined elsewhere          
        3.2     Terms defined in this Recommendation              
 4     Abbreviations and acronyms              
 5     Conventions             
 6     Secure RTP package              
        6.1     Properties       
        6.2     Events             
        6.3     Signals             
        6.4     Statistics         
        6.5     Error codes    
        6.6     Procedures     
 7     Key management using SDP security descriptions       
        7.1     Overspecification of SRTP parameters and multiple keys              
        7.2     Wildcarding of SRTP parameters            
        7.3     Interoperability with offer/answer-based implementations         
        7.4     SDES and SRTP cryptographic contexts 
        7.5     Mapping of master keys for sent packets and received packets statistics
 8     Security considerations         
Appendix I – Example call flows    
        I.1                 Initial session setup using SDP security descriptions            
        I.2                 MG1's key is about to expire        
        I.3                 Auditing SRTP capabilities             
        I.4                 Auditing of SRTP Statistics            
Appendix II – Sample use-cases of SRTP bearer encryption    
       II.1     Use-case #1: ITU-T H.248 MG for peering IP and circuit-switched networks           
       II.2     Use case #2: ITU-T H.248 MG for peering IP networks    
       II.3     Use case #3: Transparent SRTP forwarding         
Bibliography