• DocumentCode
    3227327
  • Title

    Cryptanalysis of SIP secure and efficient authentication scheme

  • Author

    Gokhroo, Mohit Kumar ; Jaidhar, C.D. ; Tomar, Anurag Singh

  • Author_Institution
    ABV-Indian Inst. of Inf. Technol. & Manage., Gwalior, India
  • fYear
    2011
  • fDate
    27-29 May 2011
  • Firstpage
    308
  • Lastpage
    310
  • Abstract
    Recently SIP authentication scheme using Elliptic Curve Cryptography has been proposed and it was claimed that scheme is efficient and secure against replay attack, password guessing attack, Man-in-middle Attack, Modification attack, Denning-Sacco attacks and Stolen verifier attack. In addition, it provides mutual authentication between communicating parties and generates a session key agreed between them. This paper shows that the scheme is still insecure. An adversary can easily derive the session key from the intercepted messages.
  • Keywords
    cryptographic protocols; signalling protocols; Denning-Sacco attacks; SIP authentication scheme; SIP secure cryptanalysis; efficient authentication scheme; elliptic curve cryptography; man-in-middle attack; modification attack; password guessing attack; stolen verifier attack; Encryption; Attacks; Authentication; SIP; Session Key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
  • Conference_Location
    Xi´an
  • Print_ISBN
    978-1-61284-485-5
  • Type

    conf

  • DOI
    10.1109/ICCSN.2011.6014057
  • Filename
    6014057