Cryptanalysis of DS-SIP Authentication Scheme Using ECDH

@article{Yoon2009CryptanalysisOD,
  title={Cryptanalysis of DS-SIP Authentication Scheme Using ECDH},
  author={Eun-Jun Yoon and Kee-Young Yoo},
  journal={2009 International Conference on New Trends in Information and Service Science},
  year={2009},
  pages={642-647}
}
Session Initiation Protocol (SIP) is widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). In 2005, and proposed an authentication scheme using Elliptic Curve Diffie-Hellman (ECDH) problem for SIP called DS-SIP. However, this paper demonstrates that DS-SIP authentication scheme is still vulnerable to Denning-Sacco attack which an attacker can easily find a legal user's secret password when SIP client or SIP server… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 24 extracted citations

A Survey of SIP Authentication and Key Agreement Schemes

IEEE Communications Surveys & Tutorials • 2014
View 7 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 14 references

Elliptic Curve Cryptosystems

View 5 Excerpts
Highly Influenced

A password authentication scheme with secure password updating

Computers & Security • 2003
View 4 Excerpts
Highly Influenced

Timestamps in Key Distribution Protocols

View 4 Excerpts
Highly Influenced

Security mechanism agreement for SIP sessions, IETF Internet Draft (draft-ietf-sipsecagree-04.txt)

J. Arkko
2002
View 1 Excerpt

SIP Security Requirements

M. Thomas
IETF Internet Draft • 2001
View 1 Excerpt

Comments on password-based private key download protocol of NDSS’99

S. J. Kim, B. C. Kim, S. J. Park
Electronics Letters. vol. 35, No. 22, pp. 1937-1938 • 1999
View 2 Excerpts

Similar Papers

Loading similar papers…