Generated by GPT-5-mini| ZRTP | |
|---|---|
| Name | ZRTP |
| Developer | Phil Zimmermann |
| Introduced | 2007 |
| Type | Key-agreement protocol |
| Based on | Diffie–Hellman |
ZRTP
ZRTP is a cryptographic key-agreement protocol for establishing secure media sessions over packet networks. It was designed to provide end-to-end voice and video confidentiality for real-time communications between endpoints running applications such as softphones and gateways. The protocol complements signaling standards and was created to operate independently of Session Initiation Protocol, SIP-T, H.323, and network intermediaries.
ZRTP performs ephemeral key exchange during media negotiation to generate session keys for encryption of real-time transport streams. The protocol integrates with Real-time Transport Protocol and leverages ephemeral Diffie–Hellman exchanges to derive keys used by Secure Real-time Transport Protocol, SRTP, and cipher suites like AES and ChaCha20. ZRTP was authored to resist active interception by entities such as National Security Agency, GCHQ, and adversaries using compromised Session Border Controller devices, while also enabling manual verification methods akin to those advocated by Phil Zimmermann and Whitfield Diffie.
ZRTP runs in the media path, negotiating cryptographic material over RTP packets without modifying signaling protocols like SIP, Jabber/XMPP, Skype protocol, or Microsoft Lync. The protocol initiates an ephemeral Diffie–Hellman key exchange similar to work by Martin Hellman and Ralph Merkle and derives session keys via key derivation functions comparable to those in TLS and IKEv2. ZRTP includes a Short Authentication String (SAS) for human-verifiable authentication, an approach related to concepts from Goodrich-Mitzenmacher usability research and comparable verification methods used by Signal (software), WhatsApp, and Wire (software). Optional caching of long-term public values, called the "cache" or "ZRTP cache", enables detection of future MiTM attempts, a strategy reminiscent of trust-on-first-use mechanisms used by OpenSSH and PGP.
ZRTP's security model relies on ephemeral key exchange security properties from Diffie–Hellman key exchange and forward secrecy as established in protocols like TLS 1.3 and IPsec. The SAS binds the key exchange to a short human-checkable string similar to techniques discussed in research by Aboba and Van Beek. Cryptographic primitives used in ZRTP implementations mirror standards from NIST and the IETF cryptographic community, including authenticated encryption modes and hash functions such as SHA-256 and the Advanced Encryption Standard used in AES-GCM. Formal security analyses reference methodologies from Bellare and Rogaway and threat models comparable to those in Cryptographic Protocols research; independent audits have been performed by academic groups at University of Waterloo, Carnegie Mellon University, and ETH Zurich on specific implementations. ZRTP addresses replay and downgrade attacks considered in OWASP and mitigations similar to those adopted in DTLS and ZRTP-adjacent work.
Multiple open-source and commercial projects have incorporated ZRTP into softphones, libraries, and gateways. Notable open-source implementations include integrations into PJSIP, Jitsi, and Asterisk (PBX), and commercial support has appeared in products from vendors such as Avaya, Cisco Systems, and Siemens. Mobile applications leveraging ZRTP-like approaches include early versions of SIPdroid and research prototypes from Mozilla-affiliated projects. Libraries providing ZRTP functionality have been hosted in repositories affiliated with GitHub, and testing tools used include frameworks from Wireshark and SIPp for protocol analysis and traffic generation.
Deployments of ZRTP have targeted secure voice over IP for enterprise telephony, privacy-focused messaging projects, emergency services pilots, and secure conferencing in academic collaborations with institutions such as MIT, Stanford University, and University of Cambridge. Use cases emphasize end-to-end confidentiality for deployments that route media through intermediaries like Session Border Controllers, SIP proxies, and cloud-based conferencing infrastructures from providers including Zoom Video Communications and Google Meet where media path integrity is a concern. Adoption has been strongest among privacy advocates, NGOs, and research groups investigating secure communications in contexts involving cross-border collaboration and human rights work associated with organizations like Amnesty International and Human Rights Watch.
ZRTP was proposed by Phil Zimmermann and collaborators and submitted to the Internet Engineering Task Force for discussion and publication efforts within working groups focused on real-time media security, drawing on prior standardization work such as RFC 3711 (SRTP) and RFC 5246 (TLS). The protocol influenced and was influenced by contemporaneous efforts like ZRTP RFC drafts and standardization discussions involving IETF AVTCORE and IETF SIPPING-area work. Academic presentations and industry demonstrations took place at conferences such as RSA Conference, Black Hat, and ACM CCS, while adoption discussions occurred in interoperability forums alongside 3GPP and ETSI activities. The protocol's evolution involved contributions from engineers affiliated with Counterpane Internet Security, Silent Circle, and university research labs.
Category:Cryptographic protocols