First page Back Continue Last page Graphics
How ZRTP Works
Performs keying itself in-band in the media channel
Uses ephemeral Diffie-Hellman key exchange during call setup
Shared secret is used to generate keys and salt for SRTP
Uses SRTP for media encryption
Keys are hashed and presented to users to verify as “Short Authentication Strings”
Keys are destroyed at the end of the call