Abstract
The session initiation protocol (SIP) is the most widely used signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions. The services that are enabled by SIP are equally applicable in the world of wireless communication. Recently, Tsai proposed an efficient nonce-based authentication scheme for SIP. In this paper, we do a cryptanalysis of Tsai's scheme and show that Tsai's scheme is vulnerable to the password guessing attack and stolen-verifier attack. Furthermore, Tsai's scheme does not provide known-key secrecy and perfect forward secrecy. We also propose a novel and secure mutual authentication scheme based on elliptic curve discrete logarithm problem for SIP which is immune to the presented attacks.
| Original language | English |
|---|---|
| Publication status | Published - Feb 2011 |
| Event | 13th International Conference on Advanced Communication Technology (ICACT2011) - Gangwon, Korea Duration: 13 Feb 2011 → 16 Feb 2011 |
Conference
| Conference | 13th International Conference on Advanced Communication Technology (ICACT2011) |
|---|---|
| Period | 13/02/11 → 16/02/11 |
Bibliographical note
Organising Body: Electronics and Telecommunications Research Institute (ETRI) National Information Society Agency (NIA) Global IT Research Institute (GIRI)Keywords
- Computer science and informatics