2014
DOI: 10.1002/dac.2848
|View full text |Cite
|
Sign up to set email alerts
|

An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards

Abstract: SUMMARYRecently, Zhang et al. proposed a password-based authenticated key agreement for session initiation protocol (Int J Commun Syst 2013, doi:10.1002/dac.2499. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that the protocol by Zhang et al. is vulnerable to impersonation attack whereby an active adversary without knowing the user's password is able to introduce himself/herself as the user. In addition, we show that the protocol by Zhang et al. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
7
1

Relationship

5
3

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 44 publications
0
19
0
Order By: Relevance
“…The ECC security has been proved to be more efficient cryptographic scheme as compared to earlier conventional techniques like RSA, DH and DSA [12][13][14][15][16][17][18][19][20][21]. This technique provides an equivalent level of security with much less key sizes.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 94%
“…The ECC security has been proved to be more efficient cryptographic scheme as compared to earlier conventional techniques like RSA, DH and DSA [12][13][14][15][16][17][18][19][20][21]. This technique provides an equivalent level of security with much less key sizes.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 94%
“…According to step A3 of the proposed scheme, the legitimate server will successfully be authenticated if Equation (15) holds. This equation holds, becauseW D W 0 and SK D SK 0 .…”
Section: Proofmentioning
confidence: 99%
“…Although various cryptography based schemes are proposed [8,9,10], key updating in VoIP is still an unsolved issue. In order to achieve frequent key updating for VoIP from both security and performance viewpoint, we propose a novel key updating scheme based on steganography and cryptography.…”
Section: Introductionmentioning
confidence: 99%