1SRTP and ICM References 2September, 2005 3 4This document provides references for the various cryptographic 5functions used in libSRTP and libaesicm. 6 7Secure RTP is defined in RFC 3711, which is included in this 8distribution for convenience. The counter mode definition is in 9Section 4.1.1 of the SRTP draft. 10 11SHA-1 is defined in FIPS-180-1, available online at the NIST website. 12 13HMAC is defined in RFC2104, and HMAC-SHA1 test vectors are available 14in RFC2202, which are available online at http://www.ietf.org/rfc/ 15 16ICM is defined by draft-irtf-cfrg-icm-00.txt, and its application in 17ISMAcryp (the Internet Streaming Media Alliance 1.0 Encryption and 18Authentication) is defined in that specification. It is available 19from http://www.isma.tv/. 20 21 22