Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol

被引:26
作者
Tang, Hongbin [1 ]
Liu, Xinsong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
关键词
Password guessing attack; Session initiation protocol; Elliptic curve cryptography; Authentication; Protocol; Cryptography;
D O I
10.1007/s11042-012-1001-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement.
引用
收藏
页码:321 / 333
页数:13
相关论文
共 50 条
  • [41] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card
    Chen, Chin-Ling
    Deng, Yong-Yuan
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
  • [42] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391
  • [43] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    Wireless Personal Communications, 2016, 91 : 1361 - 1391
  • [44] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [45] Attacks on the shen et al.'s timestamp-based password authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 319 - 321
  • [46] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
    Bander A. Alzahrani
    Azeem Irshad
    Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
  • [47] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme
    Alzahrani, Bander A.
    Irshad, Azeem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 8239 - 8253
  • [48] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [49] An Improvement of Sood, et al. 's Authentication Scheme using Smart Card
    Shin, Kwang Cheul
    Cho, Jung Gil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 271 - 281
  • [50] Attacks to Li et al.'s Billing Service User Authentication Scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767