Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Formal Analysis of the Real-time Multimedia Network Protocol ZRTP

Author(s): Siqi Lu, Wenbo Wang and Qingfeng Cheng

Volume 8, Issue 1, 2015

Page: [12 - 17] Pages: 6

DOI: 10.2174/2352096508666150317234447

Price: $65

Abstract

As the multimedia social network develops rapidly, protocols protecting the security of realtime multimedia are becoming very significant. The ZRTP protocol, one of Real-time Transport Protocols (RTPs) for real-time multimedia applications, has many advantages compared with others. Though the calculation cost is relatively high, the ZRTP protocol provides perfect forward secrecy and authentication against man-in-the-middle attack. As so many formal verification tools were proposed recently, formal method has become one of the main methods of security protocol analysis. However, the formal verification tools are rarely used for the Real-time Transport Protocols. In this paper, we innovatively utilize the formal verification tool Scyther- Compromise and Tamarin to analyse the ZRTP protocol. According to the results, we find that the ZRTP protocol is insecure under the eCK model though it provides the perfect forward secrecy property. The adversary can impersonate the endpoint when the shared secrets are revealed. Besides, the experiments of this paper show that the formal method can perform perfectly and play an important role in protocol analysis.

Keywords: Formal analysis, real-time transport protocol, scyther, tamarin, ZRTP protocol.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy