SRTP Key Rotation in 2026: DTLS 1.3, Perfect Forward Secrecy, and Re-Keying
DTLS 1.3 (RFC 9147) is rolling out across browsers in 2026. SRTP keys must rotate per session and the cipher floor moved to AES-128-GCM with PFS. Here is what production HIPAA voice needs.
DTLS 1.3 (RFC 9147) is rolling out across browsers in 2026. SRTP keys must rotate per session and the cipher floor moved to AES-128-GCM with PFS. Here is what production HIPAA voice needs.
The threat
A SRTP master key compromised mid-call leaks every packet from that point on, and without Perfect Forward Secrecy (PFS) past sessions are also exposed if the long-term key is later stolen. Pre-2026 stacks shipped DTLS 1.0/1.1 and SRTP_AES128_CM_HMAC_SHA1_80 — both deprecated. Auditors now flag any TLS/DTLS < 1.2 as a finding for HIPAA, PCI, and SOC 2 reports.
Defense
Per RFC 8827 and the IETF 2026 update, WebRTC implementations MUST offer DTLS-SRTP, prefer DTLS 1.3, and prefer cipher suites with PFS (ECDHE_*). The mandatory profile is SRTP_AES128_CM_HMAC_SHA1_80 for compatibility, but SRTP_AEAD_AES_128_GCM is now the recommended floor. Keys derive fresh from each DTLS handshake — every new RTCPeerConnection = new master key. Re-key by tearing down and re-establishing the DTLS session on a configurable interval (commonly 1h or 1GB transferred).
Hear it before you finish reading
Talk to a live CallSphere AI voice agent in your browser — 60 seconds, no signup.
flowchart TD
A[New peer connection] --> B[DTLS 1.3 handshake · ECDHE]
B --> C[Master key derived · PFS]
C --> D[SRTP profile · AES-128-GCM]
D --> E[Media streams encrypted]
E --> F{1h or 1GB elapsed?}
F -- yes --> G[Trigger re-key · new DTLS]
F -- no --> E
G --> C
CallSphere implementation
CallSphere requires DTLS 1.3 with TLS_AES_128_GCM_SHA256 + ECDHE-P256 fallback to 1.2 only for legacy carriers. SRTP profile floor: AEAD_AES_128_GCM. Re-key every 1 hour or 1 GB transferred, whichever comes first. 37 agents · 90+ tools · 115+ tables · 6 verticals · HIPAA + SOC 2 aligned. All keys are session-ephemeral; no master key ever touches disk. The Real Estate OneRoof Pion Go gateway 1.23 honors the same key-rotation policy. Plans: $149 / $499 / $1,499, 14-day trial, 22% affiliate Year 1.
Build steps
- Compile your media stack (Pion, mediasoup, Janus) against OpenSSL 3.2+ for DTLS 1.3
- Configure cipher suite preference: ECDHE-ECDSA-AES128-GCM first
- Reject DTLS < 1.2 on the server policy
- Implement re-key by closing/recreating RTCPeerConnection on schedule
- Log SRTP profile + DTLS version per session for audit
FAQ
DTLS 1.3 backward compatible? Negotiated — falls back to 1.2 if peer doesn't support. 1.0/1.1 must be disabled outright.
Per-packet vs per-session keys? Per-session derived from DTLS, per-packet IV from sequence number — replay protection lives there.
Still reading? Stop comparing — try CallSphere live.
CallSphere ships complete AI voice agents per industry — 14 tools for healthcare, 10 agents for real estate, 4 specialists for salons. See how it actually handles a call before you book a demo.
Re-key during a call disrupts audio? Tens of ms gap if implemented as new DTLS handshake; users do not perceive it.
PFS optional in 2026? No, in practice. Auditors flag non-PFS suites.
Quantum-safe? Not yet — DTLS 1.3 with hybrid Kyber+ECDHE is in draft. Track IETF progress; deploy in 2027.
Sources
- RFC 8827 - WebRTC Security Architecture - https://datatracker.ietf.org/doc/html/rfc8827
- AntMedia - WebRTC Security 2026 - https://antmedia.io/webrtc-security/
- WebRTC Curious - Securing - https://webrtcforthecurious.com/docs/04-securing/
- Nabto - Understanding WebRTC Security Architecture - https://www.nabto.com/understanding-webrtc-security/
Try CallSphere AI Voice Agents
See how AI voice agents work for your industry. Live demo available -- no signup required.