Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography”

2016 ◽  
Vol 76 (11) ◽  
pp. 13581-13583 ◽  
Author(s):  
Saru Kumari
2021 ◽  
Vol 19 (1) ◽  
pp. 66-85
Author(s):  
Yanrong Lu ◽  
◽  
Dawei Zhao ◽  

<abstract><p>Designing a secure authentication scheme for session initial protocol (SIP) over internet protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang, Tang and Zhu (2015) and reveal that the protocol is vulnerable to key-compromise impersonation attacks. We then propose a SIP authenticated key agreement protocol (AKAP) using elliptic curve cryptography (ECC). We demonstrate the correctness of the protocol using Burrows-Abadi-Needham (BAN), and its security using the AVISPA simulation tool. We also evaluate its performance against those of Zhang, Tang and Zhu, and others.</p></abstract>


2005 ◽  
Vol 22 (3) ◽  
pp. 268-272 ◽  
Author(s):  
Aifen Sui ◽  
Lucas C. K. Hui ◽  
Yixian Yang ◽  
K. P. Chow

2019 ◽  
Vol 13 (3) ◽  
pp. 2830-2838 ◽  
Author(s):  
Fan Wu ◽  
Lili Xu ◽  
Xiong Li ◽  
Saru Kumari ◽  
Marimuthu Karuppiah ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document