scispace - formally typeset
Journal ArticleDOI

Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol

Reads0
Chats0
TLDR
The analysis of security of the ECC-based authentication scheme for SIP shows that the scheme is suitable for the applications with higher security requirement and only needs to compute four elliptic curve scale multiplications and two hash-to-point operations.
Abstract
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement.

read more

Citations
More filters
Journal ArticleDOI

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card

TL;DR: The server can now authenticate the user on the request message received, rather than the response received upon sending the challenge message, saving another round-trip of exchanged messages and hence escapes a possible denial of service attack.
Journal ArticleDOI

A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems

TL;DR: An improved authentication scheme keeping apart the threats encountered in the design of Chaudhry et al.
Journal ArticleDOI

Security analysis and enhancements of an improved authentication for session initiation protocol with provable security

TL;DR: To show the security of the proposed authentication scheme for session initiation protocol using smart card, it is proved its security in the random oracle model and it is shown that an adversary can easily masquerade as a legal server to fool users.
Journal ArticleDOI

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

TL;DR: This paper demonstrates that the Xie’s authentication scheme is vulnerable to impersonation attack, and proposes a more secure and efficient scheme, which does not only cover all the security flaws and weaknesses of related previous protocols, but also provides more functionalities.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI

SIP: Session Initiation Protocol

TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI

Timestamps in key distribution protocols

TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
Related Papers (5)