Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
نویسندگان
چکیده
منابع مشابه
An Enhanced Authenticated Key Agreement for Session Initiation Protocol
In 2012, Xie proposed an authentication scheme based on Elliptic Curve Cryptography (ECC) for Session Initiation Protocol (SIP). However, this paper demonstrates that the Xie's scheme is vulnerable to impersonation at-tack by which an active adversary can easily forge the server's identity. Based on this attack, we also show that the Xie's scheme is also defenceless to off-line password guessin...
متن کاملA New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. T...
متن کاملAn Efficient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card
Key agreement is a crucial cryptographic primitive for building secure communication channels between two parties in a network. In the research literature a typical protocol aims for key secrecy and mutual authentication. However, there are many important practical scenarios where privacy protection is more desirable, especially for social network environment. Nowadays, social network environme...
متن کاملEfficient Two-Factor Authentication Protocol Using Password and Smart Card
Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.’s...
متن کاملImproving the Lee-lee’s Password Based Authenticated Key Agreement Protocol
Password based authenticated key agreement protocols have been the most widely used methods for user authentication, since it allows people to choose and remember their own passwords without any assistant device. Password based authenticated key agreement protocols, however, are vulnerable to password guessing attacks since users usually choose easy-to-remember passwords. Recently, Lee and Lee ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Systems
سال: 2013
ISSN: 1074-5351
DOI: 10.1002/dac.2499