2015
DOI: 10.1007/s11042-015-2487-7
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
7

Relationship

5
2

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…An attacker is supposed to be having following capabilities An attacker may steal the smart card contents by power analysis and reverse engineering procedures. An adversary may intercept, eavesdrop, modify, and replay messages over a public channel. An adversary might be an insider, ie, legitimate user or a server having malicious intentions. An adversary might guess a low entropy password and identity of a user. …”
Section: Preliminariesmentioning
confidence: 99%
“…An attacker is supposed to be having following capabilities An attacker may steal the smart card contents by power analysis and reverse engineering procedures. An adversary may intercept, eavesdrop, modify, and replay messages over a public channel. An adversary might be an insider, ie, legitimate user or a server having malicious intentions. An adversary might guess a low entropy password and identity of a user. …”
Section: Preliminariesmentioning
confidence: 99%
“…However, an adversary can obtain Tk(IDA) by stealing A's smart card. Although the smart card may come with a tamper-resistant property, sensitive contents stored in the card can be still extracted by some side channel attacks [16,17,18,19,20]. In both cases, an adversary has an opportunity to obtain the Tk(IDX) for any user X.…”
Section: The Secrecy Of Tk(ida)mentioning
confidence: 99%
“…The ECC security has been proved to be more efficient cryptographic scheme as compared to earlier conventional techniques like RSA, DH and DSA [12][13][14][15][16][17][18][19][20][21]. This technique provides an equivalent level of security with much less key sizes.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%