Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol

被引:0
|
作者
Hongbin Tang
Xinsong Liu
机构
[1] University of Electronic Science and Technology of China,School of Computer Science and Engineering
来源
关键词
Password guessing attack; Session initiation protocol; Elliptic curve cryptography; Authentication; Protocol; Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement.
引用
收藏
页码:321 / 333
页数:12
相关论文
共 50 条
  • [1] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333
  • [2] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [3] A robust ECC based mutual authentication protocol with anonymity for session initiation protocol
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Li, Linsen
    Alzahrani, Bander
    [J]. PLOS ONE, 2017, 12 (10):
  • [4] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    [J]. PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [5] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Arezou Ostad-Sharif
    Dariush Abbasinezhad-Mood
    Morteza Nikooghadam
    [J]. Journal of Medical Systems, 2019, 43
  • [6] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [7] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [8] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
  • [9] Cryptanalysis of Farash et al.'s SIP authentication protocol
    Azrour, Mourade
    Farhaoui, Yousef
    Ouanan, Mohammed
    [J]. INTERNATIONAL JOURNAL OF DYNAMICAL SYSTEMS AND DIFFERENTIAL EQUATIONS, 2018, 8 (1-2) : 77 - 94
  • [10] Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol
    Qiu, Shuming
    Xu, Guoai
    Guo, Yanhui
    Zhang, Miao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)