Journal ArticleDOI
Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
Hongbin Tang,Xinsong Liu +1 more
Reads0
Chats0
TLDR
The analysis of security of the ECC-based authentication scheme for SIP shows that the scheme is suitable for the applications with higher security requirement and only needs to compute four elliptic curve scale multiplications and two hash-to-point operations.Abstract:
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement.read more
Citations
More filters
Journal ArticleDOI
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
Hamed Arshad,Morteza Nikooghadam +1 more
TL;DR: It is concluded that Irshad et al.
Journal ArticleDOI
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
TL;DR: The server can now authenticate the user on the request message received, rather than the response received upon sending the challenge message, saving another round-trip of exchanged messages and hence escapes a possible denial of service attack.
Journal ArticleDOI
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
TL;DR: An improved authentication scheme keeping apart the threats encountered in the design of Chaudhry et al.
Journal ArticleDOI
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
TL;DR: To show the security of the proposed authentication scheme for session initiation protocol using smart card, it is proved its security in the random oracle model and it is shown that an adversary can easily masquerade as a legal server to fool users.
Journal ArticleDOI
An Enhanced Authenticated Key Agreement for Session Initiation Protocol
TL;DR: This paper demonstrates that the Xie’s authentication scheme is vulnerable to impersonation attack, and proposes a more secure and efficient scheme, which does not only cover all the security flaws and weaknesses of related previous protocols, but also provides more functionalities.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI
SIP: Session Initiation Protocol
Jonathan Rosenberg,Henning Schulzrinne,G. Camarillo,Alan B. Johnston,J. Peterson,Robert Sparks,Mark Handley,Eve M. Schooler +7 more
TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI
Timestamps in key distribution protocols
TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
Related Papers (5)
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
R. Arshad,Nassar Ikram +1 more