{"draft":"draft-ietf-perc-double-12","doc_id":"RFC8723","title":"Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP)","authors":["C. Jennings","P. Jones","R. Barnes","A.B. Roach"],"format":["HTML","TEXT","PDF","XML"],"page_count":"18","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Privacy Enhanced RTP Conferencing","abstract":"In some conferencing scenarios, it is desirable for an intermediary\r\nto be able to manipulate some parameters in Real-time Transport\r\nProtocol (RTP) packets, while still providing strong end-to-end\r\nsecurity guarantees. This document defines a cryptographic transform\r\nfor the Secure Real-time Transport Protocol (SRTP) that uses two\r\nseparate but related cryptographic operations to provide hop-by-hop\r\nand end-to-end security guarantees. Both the end-to-end and\r\nhop-by-hop cryptographic algorithms can utilize an authenticated\r\nencryption with associated data (AEAD) algorithm or take advantage of\r\nfuture SRTP transforms with different properties.","pub_date":"April 2020","keywords":["PERC","SRTP","RTP","conferencing","encryption"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8723","errata_url":null}