2018
DOI: 10.1002/dac.3568
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol

Abstract: Summary Recently, Chaudhry et al and Kumari et al proposed an advanced mutual authentication protocol for Session Initiation Protocol on the basis of the protocol of Lu et al. The authors claimed that their schemes can be resistant to various attacks. Unfortunately, we observe some important flaws in their respective schemes. We point out that their schemes are prone to off‐line password guessing and privileged insider attacks. To remedy their protocols's drawbacks, in this paper, we present a new improved aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…However, the scheme does not support mutual authentication and is vulnerable to insider attack [22]. Recently, Shuming et al [33] proposed the scheme on the top of Zhang et al [32] that provide resistance against off-line password guessing and insider attacks. Hsiu-Lien [34] proposed a scheme that uses a smart card along with elliptic curve cryptography for the SIP authentication.…”
Section: Related Workmentioning
confidence: 99%
“…However, the scheme does not support mutual authentication and is vulnerable to insider attack [22]. Recently, Shuming et al [33] proposed the scheme on the top of Zhang et al [32] that provide resistance against off-line password guessing and insider attacks. Hsiu-Lien [34] proposed a scheme that uses a smart card along with elliptic curve cryptography for the SIP authentication.…”
Section: Related Workmentioning
confidence: 99%
“…However, Yang et al [ 3 ] identified that Frank’s proposal was insecure and provided an improved solution in 2005. In order to present a secure and efficient authentication and key agreement protocol, in the following decade, many single-, two-, and three-factor authentication protocols were constructed while employing RSA, discrete logarithm over general groups, elliptic curve cryptography (ECC), chaotic maps [ 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 ], etc. However, some security limitations are prevailing in these protocols.…”
Section: Introductionmentioning
confidence: 99%