DocumentCode
3227327
Title
Cryptanalysis of SIP secure and efficient authentication scheme
Author
Gokhroo, Mohit Kumar ; Jaidhar, C.D. ; Tomar, Anurag Singh
Author_Institution
ABV-Indian Inst. of Inf. Technol. & Manage., Gwalior, India
fYear
2011
fDate
27-29 May 2011
Firstpage
308
Lastpage
310
Abstract
Recently SIP authentication scheme using Elliptic Curve Cryptography has been proposed and it was claimed that scheme is efficient and secure against replay attack, password guessing attack, Man-in-middle Attack, Modification attack, Denning-Sacco attacks and Stolen verifier attack. In addition, it provides mutual authentication between communicating parties and generates a session key agreed between them. This paper shows that the scheme is still insecure. An adversary can easily derive the session key from the intercepted messages.
Keywords
cryptographic protocols; signalling protocols; Denning-Sacco attacks; SIP authentication scheme; SIP secure cryptanalysis; efficient authentication scheme; elliptic curve cryptography; man-in-middle attack; modification attack; password guessing attack; stolen verifier attack; Encryption; Attacks; Authentication; SIP; Session Key;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location
Xi´an
Print_ISBN
978-1-61284-485-5
Type
conf
DOI
10.1109/ICCSN.2011.6014057
Filename
6014057
Link To Document