期刊文献+

对TAKA_(SIP)协议的分析和改进 被引量:4

Cryptanalysis and improvement of TAKA_(SIP) protocol
下载PDF
导出
摘要 会话初始化协议(SIP)提供了认证和协商会话密钥,能保证后续会话的安全。2010年,Yoon等(YOONE-J,YOO K-Y.A three-factor authenticated key agreement scheme for SIP on elliptic curves.NSS'10:4th InternationalConference on Network and System Security.Piscataway:IEEE,2010:334-339)提出一种新的三要素SIP认证密钥协商协议TAKASIP。但TAKASIP协议不能抵抗内部攻击、服务器伪装攻击、离线口令猜测攻击、身份冒充攻击和丢失标记攻击,并且没有提供双向认证。在TAKASIP协议基础上提出一种基于椭圆曲线密码三要素SIP认证协议ETAKASIP以解决上述问题。ETAKASIP基于椭圆曲线离散对数难题和椭圆曲线密码系统,提供了高安全性。该协议只需7次椭圆曲线点乘运算、1次椭圆曲线加法运算和最高6次哈希运算,有较高的运算效率。 Session Initiation Protocol (SIP) provides authentication and session key agreement to ensure the security of the successive session. In 2010, Yoon et al, ( YOON E-J, YOO K-Y. A three-factor authenticated key agreement scheme for SIP on elliptic curves. NSS '10: 4th International Conference on Network and System Security. Piseataway: IEEE, 2010:334 - 339. ) proposed a three-factor authenticated key agreement scheme named TAKAsw for SIP. However, the scheme is vulnerable to insider attack, server-spoofing attack, off-line password attack, and losing token attack. Moreover, it does not provide mutual authentication. To overcome these flaws of TAKAsip, a new three-factor authentication scheme named ETAKAsip based on Elliptic Curve Cryptosystem (ECC) was proposed. ETAKAsip, on the basis of elliptic curve discrete logarithm problem, provides higher security than TAKAsip. It needs 7 elliptic curve scalar multiplication operations, 1 additional operation and up to 6 Hash operations, and of high efficiency.
出处 《计算机应用》 CSCD 北大核心 2012年第2期468-471,共4页 journal of Computer Applications
关键词 密码学 认证协议 椭圆曲线密码系统 密钥协商 会话初始化协议 cryptography authentication protocol Elliptic Curve Cryptosystem (ECC) key agreement SessionInitiation Protocol (SIP)
  • 相关文献

参考文献2

共引文献2

同被引文献36

  • 1Rosenberg J, Schulzrinne H.SIP: Session initiation protocol[S].2002.
  • 2Ring J, Choo K K R.A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography[C]//Proc of Aus CERT Asia Pacific Infor- mation Technology Security Conference.Brisbane:Univer- sity of Queensland Publication,2006: 57-72.
  • 3Wu L F, Zhang Y Q, Wang F J.A new provably secure authen-tication and key agreement protocol for SIP using ECC[J]. Computer Standards and Interface, 2009,31 (2) : 286-291.
  • 4Hankerson D, Menezes A, Vanstone S.Guide to elliptic curve cryptography[M].New York, USA: Springer-Verlag, 2004.
  • 5Yoon E J,Yoo K Y.A three-factor authenticated key agree- ment scheme for SIP on elliptic curves[C]//Proceedings of the 4th International Conference on Network and System Security (NSS' 10) .Piscataway: IEEE, 2010: 334-339.
  • 6Clarke E M, Grumberg O, Peled D A.Model checking[M]. London:MIT Press, 1999.
  • 7Holzmann G J.The spin model checker primer and ref- erence manual[M].Boston: Addison-Wesley, 2003.
  • 8Marrero W, Clarke E M, Jha S.A model checker for authentication protocols[C]//Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.
  • 9Lee C H,Huang C M,Tseng P H.Multihomed SIP-based network mobility for the scheduled public transit service[J].Wirel.Commun.Mob.Comput,2014,14(1):79-90.
  • 10Rosenberg J,Sshulzrinne H,Camarillo G,et al.SIP:Session Initiation Protocal[S].RFC 3261,2002.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部