Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol

被引:26
|
作者
Tang, Hongbin [1 ]
Liu, Xinsong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
关键词
Password guessing attack; Session initiation protocol; Elliptic curve cryptography; Authentication; Protocol; Cryptography;
D O I
10.1007/s11042-012-1001-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement.
引用
收藏
页码:321 / 333
页数:13
相关论文
共 50 条
  • [41] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [42] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [43] Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
    Mosina, Natalia
    Ushakov, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 149 - 174
  • [44] Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems
    Yang, Y.
    Gu, J.
    Lv, C.
    Jiang, Q.
    Ma, W.
    IET INFORMATION SECURITY, 2012, 6 (04) : 239 - 248
  • [45] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [46] Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
    Irshad, Azeem
    Sher, Muhammad
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Chaudhry, Shehzad Ashraf
    Kumari, Saru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 523 - 549
  • [47] Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Chaturvedi, Ankita
    Kumari, Saru
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (06)
  • [48] Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Ankita Chaturvedi
    Saru Kumari
    Muhammad Khurram Khan
    Journal of Medical Systems, 2014, 38
  • [49] Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
    Ryu, Jongseok
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 11511 - 11526
  • [50] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    AD HOC NETWORKS, 2014, 18 : 133 - 146