Security analysis and enhancements of an improved authentication for session initiation protocol with provable security

被引:0
|
作者
Mohammad Sabzinejad Farash
机构
[1] Kharazmi University,Faculty of Mathematical Sciences and Computer
来源
Peer-to-Peer Networking and Applications | 2016年 / 9卷
关键词
Password-based protocol; Elliptic curve; Session initiation protocol; Smart card; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
Very recently, Tu et al. proposed an authentication scheme for session initiation protocol using smart card to overcome the security flaws of Zhang et al.’s protocol. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Tu et al.’s protocol is insecure against impersonation attack. We show that an adversary can easily masquerade as a legal server to fool users. As a remedy, we also improve Tu et al.’s protocol without imposing extra computation cost. To show the security of our protocol, we prove its security in the random oracle model.
引用
收藏
页码:82 / 91
页数:9
相关论文
共 50 条
  • [21] Security analysis of session initiation protocal
    Zhang, Zhaoxin
    Fang, Binxinc
    Hu, Mingzeng
    Zhang, Hongli
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (02): : 457 - 469
  • [22] On the Provable Security of the Dragonfly Protocol
    Lancrenon, Jean
    Skrobot, Marjan
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 244 - 261
  • [23] An improved smart card based password authentication scheme with provable security
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 723 - 728
  • [24] An improved authentication protocol for session initiation protocol using smart card
    Tu, Hang
    Kumar, Neeraj
    Chilamkurti, Naveen
    Rho, Seungmin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 903 - 910
  • [25] An improved authentication protocol for session initiation protocol using smart card
    Hang Tu
    Neeraj Kumar
    Naveen Chilamkurti
    Seungmin Rho
    Peer-to-Peer Networking and Applications, 2015, 8 : 903 - 910
  • [26] Security analysis and enhancements of a remote user authentication scheme
    Cao, Shou-Qi
    Sun, Qing
    Cao, Li-Ling
    International Journal of Network Security, 2019, 21 (04) : 661 - 669
  • [27] An improved and efficient mutual authentication scheme for session initiation protocol
    Zhang, Yuanyuan
    Xie, Kunming
    Ruan, Ou
    PLOS ONE, 2019, 14 (03):
  • [28] Provable Security Analysis of the Secure Remote Password Protocol
    Dayanikli, Dennis
    Lehmann, Anja
    2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 620 - 635
  • [29] Intelligent Network Security with Session Initiation Protocol and Web Services
    Handoura, Abdallah
    Bourget, Daniel
    International Journal of Network Security, 2024, 26 (04) : 582 - 588
  • [30] An improved smart card based authentication scheme for session initiation protocol
    Kumari, Saru
    Chaudhry, Shehzad Ashraf
    Wu, Fan
    Li, Xiong
    Farash, Mohammad Sabzinejad
    Khan, Muhammad Khurram
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 92 - 105