作者: Martin Petraschek , Helmut Hlavacs , Thomas Hoeher , Wilfried N. Gansterer , Oliver Jung
DOI:
关键词:
摘要: ZRTP is a protocol designed to set up shared secret between two com- munication parties which subsequently used secure the media stream (i.e. audio data) of VoIP connection. It uses Diffie-Hellman (DH) key exchange agree upon session key, inherently vulnerable active Man-in-the-Middle (MitM) attacks. Therefore introduces some proven methods detect such The most important measure so called Short Authentication String (SAS). This characters that derived essentially from public values and displayed end users for reading out comparing over phone. If SAS on caller's callee's side match, there high probability no MitM attack going on. Furthermore, offers form continuity by caching material previous sessions use in next call. In order prevent can manipulate way both partners get same although different keys were negotiated, hash commitment DH value. Despite these measures Relay Attack (also known as Mafia Fraud or Chess Grandmaster Attack) still possible. We present practical implementation an discuss its characteristics limitations, show works only certain scenarios.