An additional mode of key distribution in MIKEY
draft-ignjatic-msec-mikey-rsa-r-00

Document Type Replaced Internet-Draft (individual)
Authors Dragan Ignjatic  , Lakshminath Dondeti 
Last updated 2010-04-08 (latest revision 2005-01-28)
Replaced by RFC 4738
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-msec-mikey-rsa-r
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ignjatic-msec-mikey-rsa-r-00.txt

Abstract

The MIKEY specification [2] describes several modes of key distribution to setup SRTP [4] sessions, viz., pre-shared key, public-key, and an optional Diffie-Hellman key exchange. In the public-key mode the initiator encrypts a random key with the responder's public key and sends it to the responder. In many VoIP calling scenarios, the initiator may not know the responder's public key or in some cases the responder's ID (e.g., call forwarding) in advance. We propose a new MIKEY mode that works well in such scenarios.

Authors

Dragan Ignjatic (dignjatic@polycom.com)
Lakshminath Dondeti (ldondeti@qualcomm.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)