원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
The authentication procedure in session initiation protocol (SIP), an IETF standard protocol for initiating an interactive user session, typically uses HTTP digest authentication, which is vulnerable to many known attacks. To cope with the problems, Wu et al. proposed a new authenticated key exchange (NAKE) protocol for SIP based on the Elliptic Curve Cryptosystem. However, this paper shows that the NAKE is insecure against the off-line password guessing attack and proposes a modified authenticated key exchange (MAKE) protocol for SIP. The MAKE fits neatly in the SIP protocols as described in RFC 3261.
목차
Abstract
1. Introduction
2. Review of NAKE Protocol
3. Weakness in NAKE Protocol
4. Modified Authenticated Key Exchange Protocol
5. Security Analysis
5.1 Replay Attack
5.2 Off-line Password Guessing Attack
5.3 Server Spoofing
5.4 Perfect Forward Secrecy
6. Conclusion
References
1. Introduction
2. Review of NAKE Protocol
3. Weakness in NAKE Protocol
4. Modified Authenticated Key Exchange Protocol
5. Security Analysis
5.1 Replay Attack
5.2 Off-line Password Guessing Attack
5.3 Server Spoofing
5.4 Perfect Forward Secrecy
6. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보