期刊文献+

基于ECDLP的SIP认证密钥协商协议

SIP Authentication Key Agreement Protocol Based on ECDLP
下载PDF
导出
摘要 SIP协议是应用层控制协议,为了提高SIP协议的安全性,基于椭圆曲线离散对数问题的难解性,结合用户身份、用户口令及单向陷门函数F(),提出了一种基于ECDLP的SIP认证密钥协商协议。协议过程主要由初始化、注册、登录认证、口令修改4部分组成。安全分析表明,该协议实现了双向认证、提供了安全会话密钥,能抵抗口令猜测攻击、中间人攻击、重放攻击、冒充攻击、Denning-Sacco攻击等。与相关协议比较,文章所提出的基于ECDLP的SIP认证密钥协议具有更高的安全性,能更好地满足应用需求。 The SIP protocol is a controlling protocol. In order to improve the security of SIP protocol,based on the intractability of the elliptic curve discrete logarithm problem,this paper proposes an SIP authentication key agreement protocol with the basis of ECDLP,combining the user’s identity,password and One-way Trapdoor Function F(). The agreement process consists of four parts:initialization,registration,login authentication,and changing password. The safety analysis shows that the proposed protocol not only provides two-way authentication and a safe session key,but also resists the password-guessing attack,man-in-the-middle attack,replay attack,masquerade attack,and Denning-Sacco attack. Compared with other protocols,the proposed SIP authentication key agreement based on ECDLP is more secure and can better meet the application demands.
作者 曹阳
出处 《信息工程大学学报》 2016年第1期102-105,共4页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(21373132) 陕西省教育厅资助项目(14JK1132) 陕西理工学院科研计划资助项目(SLGKY14-09)
关键词 椭圆曲线离散对数问题 认证 密钥协商 SIP 单向陷门函数F() elliptic curve discrete logarithm problem certification key agreement SIP(session initiation protocol) one-way trapdoor function F()
  • 相关文献

参考文献12

  • 1Handley M, Schulzrinne H, Schooler E, et al. SIP: ses- sion initiation protocol[ S]. 1999.
  • 2Geneiatakis D, Dagiuklas T, Kambourakis G, et al. Sur- vey of security vulnerabilities in session initiation protocol [ J]. IEEE Communication Surveys and Tutorials, 2006, 8(3) : 68-81.
  • 3Lee C C. On security of an efficient nonce based authen- tication scheme for SIP[J].Int. J. Netw. Secur, 2009, 9(3) : 201-203.
  • 4Xie Q. A new authenticated key agreement for session in- itiation protocol[ J]. International Journal of Communica- tion Systems, 2012, 25 ( 1 ) :47-54.
  • 5Liu F W, Koenig H. Cryptanalysis of a SIP authentica- tion scheme[ C ]//Communications and Multimedia Secu- rity. 2011 : 134-143.
  • 6He D B, Chen J H, Zhang R. A more secure authentica- tion scheme for telecare medicine information systems [ J ]. Journal of Medical Systems, 2012, 36 ( 3 ) : 1989-1995.
  • 7Yang C C, Wang R C, Liu W T. Secure authentication scheme for session initiation protocol [ J ]. Computers and Security, 2005, 24: 381-386.
  • 8Durlanik A, Sogukpinar I. SIP authentication scheme u- sing ECDH[ J]. World Enformatika so city Transaction on Engineering computing and technology, 2005, 8 : 350-353.
  • 9Tsai J L. Efficient nonce-based authentication scheme for session initiation protocol [ J ]. Intern ational Journal of Network Security, 2009, 8(3): 312-316.
  • 10Yoon E J, Yoo K Y. A three-factor authenticated key a- greement scheme for SIP on elliptic curves [ C ]//Pro- ceedings of the 2010 Fourth International Conference on Network and System Security. 2010: 334-339.

二级参考文献9

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部