The ZRTP protocol has been extensively peer reviewed since it's first specifications published in 2006.
In this page we would like to collect the most relevant analysis that have been done in evaluating and auditing ZRTP protocol.
If you know other papers referring ZRTP please write us to include it to the list.
Formal verification proving the security of ZRTP DH mode | The ZRTP Protocol - Analysis of the Diffie-Hellman mode | Riccardo Bresciani Trinity College, Dublin, Ireland |
An evaluation of ZRTP protocol showing resistance to most cryptographic attacks | ZRTP Protocol - Security Considerations | Riccardo Bresciani Ecole Normale Superiore De Cachan, France |
Independent forensics analysis on how ZRTP secure voice communications | Forensics Analysis of zFone and ZRTP | Detica, Information Intelligence London, UK |
Coverage of possible attack scenarios if authentication is not properly managed | Security and Usability Aspects of Man-In-The-Middle attacks in ZRTP | Telecommunication Research Group University of Vienna, Austria |
Research by Nokia showing how to apply ZRTP for securing Mobile communications | Peer to Peer Security for Mobile Real-Time Communications with ZRTP | Nokia Research Center, Finland |
Analysis on the residual performance impact on using VoIP with signaling and voice encryption | VoIP Networks Performance Analysis with Encryption Systems | GISSIC Investigation Group, Military University Nueva Granada, Bogotà, Colombia |
A lot of useful information about ZRTP, it's feature and how it does compare with other security protocols. | zFone FAQ | Philip Zimmermann, San Francisco, USA |
An in depth overview of major Voice Encryption protocols including ZRTP | Major Voice Security protocol Review | Fabio Pietrosanti, Milan, Italy |
Early papers showing zFone capabilities in encrypting voice communications with ZRTP protocol | zFone: A new approach for securing voice communications | Samuel Sotillo, East Carolina University, USA |
Early papers evaluating different weakness in VoIP protocols, explaining various risk mitigations with ZRTP prptocol | Information Security Issues in Voice over Internet Protocol | Jonathan Clark, School of Electrical Engineering, Georgia Institute of Technology, USA |