1 Scope
1.1 Connection model
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Secure RTP package
6.1 Properties
6.2 Events
6.3 Signals
6.4 Statistics
6.5 Error codes
6.6 Procedures
7 Key management using SDP security descriptions
7.1 Overspecification of SRTP parameters and multiple keys
7.2 Wildcarding of SRTP parameters
7.3 Interoperability with offer/answer-based implementations
7.4 SDES and SRTP cryptographic contexts
7.5 Mapping of master keys for sent packets and received
packets statistics
8 Key management using DTLS-SRTP
8.1 Key management indication
8.2 Bearer plane connection for "DTLS-SRTP"
8.3 Multi key management operation
9 Security considerations
9.1 Relation to key management scheme "SDES"
9.2 Relation to key management scheme "DTLS-SRTP"
Appendix I – Example
call flows for key management scheme "SDES"
I.1 Initial session setup using SDP security descriptions
I.2 MG1's key is about to expire
I.3 Auditing SRTP capabilities
I.4 Auditing of SRTP statistics
Appendix II – Sample
use-cases of SRTP bearer encryption
II.1 Use-case #1: ITU-T H.248 MG for peering IP and
circuit-switched networks
II.2 Use-case #2: ITU-T H.248 MG for peering IP networks
II.3 Use-case #3: Transparent SRTP forwarding
Bibliography