Statements (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
protocol
|
gptkbp:designedBy |
gptkb:Phil_Zimmermann
|
gptkbp:has |
key agreement protocol
|
https://www.w3.org/2000/01/rdf-schema#label |
ZRTP
|
gptkbp:isAttendedBy |
IETF
government agencies privacy-focused organizations |
gptkbp:isBasedOn |
SDES
|
gptkbp:isCompatibleWith |
SIP
legacy systems RTP |
gptkbp:isConsidered |
a modern encryption solution
a robust encryption method a secure alternative to traditional protocols |
gptkbp:isDedicatedTo |
PKI
|
gptkbp:isEvaluatedBy |
performance metrics
security vulnerabilities cryptographic experts |
gptkbp:isLocatedIn |
mobile applications
VoIP applications |
gptkbp:isPartOf |
open-source projects
telecommunication standards secure communications framework VoIP security protocols secure communication standards |
gptkbp:isPromotedBy |
privacy advocates
|
gptkbp:isRelatedTo |
SRTP
|
gptkbp:isSupportedBy |
gptkb:Avaya_systems
gptkb:Linphone WebRTC Asterisk FreeSWITCH Jitsi MicroSIP Zoiper Cisco_systems |
gptkbp:isTestedFor |
interoperability
|
gptkbp:isUsedIn |
secure messaging applications
secure video conferencing telephony systems enterprise communication systems cloud communication platforms secure online meetings |
gptkbp:isVisitedBy |
real-time communication
VoIP security |
gptkbp:isVulnerableTo |
man-in-the-middle attacks if not implemented correctly
|
gptkbp:provides |
end-to-end encryption
forward secrecy |
gptkbp:purpose |
secure voice communication
|
gptkbp:supports |
authentication
|
gptkbp:uses |
symmetric encryption
Diffie-Hellman key exchange |
gptkbp:wasAffecting |
2006
|