• Publications
  • Influence
The Secure Real-time Transport Protocol (SRTP)
This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replayExpand
  • 659
  • 81
  • Open Access
The Galois/Counter Mode of Operation (GCM)
  • 366
  • 74
  • Open Access
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
We present, implement, and analyze a new scalable centralized algorithm, called OFT, for establishing shared cryptographic keys in large, dynamically changing groups. Our algorithm is based on aExpand
  • 772
  • 48
  • Open Access
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binaryExpand
  • 418
  • 47
  • Open Access
Statistical Analysis of the Alleged RC4 Keystream Generator
The alleged RC4 keystream generator is examined, and a method of explicitly computing digraph probabilities is given. Using this method, we demonstrate a method for distinguishing 8-bit RC4 fromExpand
  • 232
  • 29
  • Open Access
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents asExpand
  • 273
  • 23
Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)
This document describes a Datagram Transport Layer Security (DTLS) extension to establish keys for Secure RTP (SRTP) and Secure RTP Control Protocol (SRTCP) flows. DTLS keying happens on the mediaExpand
  • 103
  • 10
  • Open Access
AES Galois Counter Mode (GCM) Cipher Suites for TLS
This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation. GCM provides bothExpand
  • 88
  • 9
  • Open Access
Deciphering malware’s use of TLS (without decryption)
The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its messages. However, TLS also introduces aExpand
  • 64
  • 8
  • Open Access
Identifying Encrypted Malware Traffic with Contextual Flow Data
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains theExpand
  • 58
  • 8
  • Open Access