SRTP Double Encryption Procedures

Document Type Replaced Internet-Draft (individual)
Authors Cullen Jennings  , Paul Jones  , Adam Roach 
Last updated 2016-03-21
Replaced by RFC 8723
Stream (None)
Intended RFC status (None)
Expired & archived
plain text htmlized pdfized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-perc-double
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


In some conferencing scenarios, it is desirable for an intermediary to be able to manipulate some RTP parameters, while still providing strong end-to-end security guarantees. This document defines SRTP procedures that use two separate but related cryptographic contexts to provide "hop-by-hop" and "end-to-end" security guarantees. Both the end-to-end and hop-by-hop cryptographic transforms can utilize an authenticated encryption with associated data scheme or take advantage of future SRTP transforms with different properties.


Cullen Jennings (
Paul Jones (
Adam Roach (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)