Formal Analysis of the Real-time Multimedia Network Protocol ZRTP

Author(s): Siqi Lu, Wenbo Wang, Qingfeng Cheng.

Journal Name: Recent Advances in Electrical & Electronic Engineering

Volume 8 , Issue 1 , 2015

Become EABM
Become Reviewer

Graphical Abstract:


As the multimedia social network develops rapidly, protocols protecting the security of realtime multimedia are becoming very significant. The ZRTP protocol, one of Real-time Transport Protocols (RTPs) for real-time multimedia applications, has many advantages compared with others. Though the calculation cost is relatively high, the ZRTP protocol provides perfect forward secrecy and authentication against man-in-the-middle attack. As so many formal verification tools were proposed recently, formal method has become one of the main methods of security protocol analysis. However, the formal verification tools are rarely used for the Real-time Transport Protocols. In this paper, we innovatively utilize the formal verification tool Scyther- Compromise and Tamarin to analyse the ZRTP protocol. According to the results, we find that the ZRTP protocol is insecure under the eCK model though it provides the perfect forward secrecy property. The adversary can impersonate the endpoint when the shared secrets are revealed. Besides, the experiments of this paper show that the formal method can perform perfectly and play an important role in protocol analysis.

Keywords: Formal analysis, real-time transport protocol, scyther, tamarin, ZRTP protocol.

Rights & PermissionsPrintExport Cite as

Article Details

Year: 2015
Page: [12 - 17]
Pages: 6
DOI: 10.2174/2352096508666150317234447

Article Metrics

PDF: 19