Skip to content
2000
Volume 8, Issue 1
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

As the multimedia social network develops rapidly, protocols protecting the security of realtime multimedia are becoming very significant. The ZRTP protocol, one of Real-time Transport Protocols (RTPs) for real-time multimedia applications, has many advantages compared with others. Though the calculation cost is relatively high, the ZRTP protocol provides perfect forward secrecy and authentication against man-in-the-middle attack. As so many formal verification tools were proposed recently, formal method has become one of the main methods of security protocol analysis. However, the formal verification tools are rarely used for the Real-time Transport Protocols. In this paper, we innovatively utilize the formal verification tool Scyther- Compromise and Tamarin to analyse the ZRTP protocol. According to the results, we find that the ZRTP protocol is insecure under the eCK model though it provides the perfect forward secrecy property. The adversary can impersonate the endpoint when the shared secrets are revealed. Besides, the experiments of this paper show that the formal method can perform perfectly and play an important role in protocol analysis.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/2352096508666150317234447
2015-04-01
2025-12-10
Loading full text...

Full text loading...

/content/journals/raeeng/10.2174/2352096508666150317234447
Loading

  • Article Type:
    Research Article
Keyword(s): Formal analysis; real-time transport protocol; scyther; tamarin; ZRTP protocol
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test