Table of Contents

 1     Scope          
        1.1     Connection model     
 2     References
 3     D
efinitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions 
 6     Secure
RTP package              
        6.1     Properties     
        6.2     Events             
        6.3     Signals             
        6.4     Statistics         
        6.5     Error codes   
        6.6     Procedures   
 7     Key management using SDP security descriptions    
        7.1     Overspecification of SRTP parameters and multiple keys           
        7.2     Wildcarding of SRTP parameters 
        7.3     Interoperability with offer/answer-based implementations     
        7.4     SDES and SRTP cryptographic contexts 
        7.5     Mapping of master keys for sent packets and received packets statistics            
 8     Key management using DTLS-SRTP  
        8.1     Key management indication  
        8.2     Bearer plane connection for "DTLS-SRTP" 
        8.3     Multi key management operation  
 9     Security considerations 
        9.1     Relation to key management scheme "SDES" 
        9.2     Relation to key management scheme "DTLS-SRTP" 
Appendix I – Example call flows for key management scheme "SDES"    
        I.1     Initial session setup using SDP security descriptions 
        I.2     MG1's key is about to expire  
        I.3     Auditing SRTP capabilities 
        I.4     Auditing of SRTP statistics 
Appendix II – Sample use-cases of SRTP bearer encryption    
       II.1     Use-case #1: ITU-T H.248 MG for peering IP and circuit-switched networks 
       II.2     Use-case #2: ITU-T H.248 MG for peering IP networks 
       II.3     Use-case #3: Transparent SRTP forwarding 
Bibliography