1
Scope
2
References
2.1
Normative references
2.2
Informative references
and Bibliography
3
Definitions
4
Symbols and
abbreviations
5
Conventions
6
Introduction
7
Overview and scenarios
7.1
MIKEY operation at
"session level"
7.2
MIKEY operation at
"media level"
7.3
MIKEY capability
negotiation
8
Security profile using
symmetric security techniques
8.1
Terminating a H.323 call
8.2
TGK re-keying and CSB
updating
8.3
H.245 tunnelling support
8.4
SRTP algorithms
8.5
List of object
identifiers
9
Security profile using
asymmetric security techniques
9.1
Terminating a H.323 call
9.2
TGK re-keying and CSB
updating
9.3
H.245 tunnelling support
9.4
SRTP algorithms
9.5
List of object
identifiers
Appendix I –
MIKEY-DHHMAC option
I.1
Terminating a H.323 call
I.2
TGK re-keying and CSB updating
Appendix II – Using
H.235.4 for establishing a pre-shared secret
II.1
Terminating a H.323 call
II.2
TGK re-keying and CSB
updating