Title :
Cryptanalysis of SIP secure and efficient authentication scheme
Author :
Gokhroo, Mohit Kumar ; Jaidhar, C.D. ; Tomar, Anurag Singh
Author_Institution :
ABV-Indian Inst. of Inf. Technol. & Manage., Gwalior, India
Abstract :
Recently SIP authentication scheme using Elliptic Curve Cryptography has been proposed and it was claimed that scheme is efficient and secure against replay attack, password guessing attack, Man-in-middle Attack, Modification attack, Denning-Sacco attacks and Stolen verifier attack. In addition, it provides mutual authentication between communicating parties and generates a session key agreed between them. This paper shows that the scheme is still insecure. An adversary can easily derive the session key from the intercepted messages.
Keywords :
cryptographic protocols; signalling protocols; Denning-Sacco attacks; SIP authentication scheme; SIP secure cryptanalysis; efficient authentication scheme; elliptic curve cryptography; man-in-middle attack; modification attack; password guessing attack; stolen verifier attack; Encryption; Attacks; Authentication; SIP; Session Key;
Conference_Titel :
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-61284-485-5
DOI :
10.1109/ICCSN.2011.6014057