CONTENTS

 1     Scope 
 2     References 
        2.1     Normative references         
        2.2     Informative references and Bibliography     
 3     Definitions  
 4     Symbols and abbreviations           
 5     Conventions     
 6     Introduction      
 7     Overview and scenarios   
        7.1     MIKEY operation at "session level"           
        7.2     MIKEY operation at "media level" 
        7.3     MIKEY capability negotiation        
 8     Security profile using symmetric security techniques          
        8.1     Terminating a H.323 call    
        8.2     TGK re-keying and CSB updating 
        8.3     H.245 tunnelling support    
        8.4     SRTP algorithms    
        8.5     List of object identifiers      
 9     Security profile using asymmetric security techniques         
        9.1     Terminating a H.323 call    
        9.2     TGK re-keying and CSB updating 
        9.3     H.245 tunnelling support    
        9.4     SRTP algorithms    
        9.5     List of object identifiers      
Appendix I – MIKEY-DHHMAC option    
        I.1        Terminating a H.323 call  
        I.2        TGK re-keying and CSB updating           
Appendix II – Using H.235.4 for establishing a pre-shared secret    
       II.1     Terminating a H.323 call     
       II.2     TGK re-keying and CSB updating