Title: Cryptanalysis of Farash et al.'s SIP authentication protocol

Authors: Mourade Azrour; Yousef Farhaoui; Mohammed Ouanan

Addresses: Department of Computer Science, M2I Laboratory, ASIA Team, Faculty of sciences and Technologies, Moulay Ismail University, Errachidia, Morocco ' Department of Computer Science, M2I Laboratory, ASIA Team, Faculty of sciences and Technologies, Moulay Ismail University, Errachidia, Morocco ' Department of Computer Science, M2I Laboratory, ASIA Team, Faculty of sciences and Technologies, Moulay Ismail University, Errachidia, Morocco

Abstract: Session initiation protocol (SIP) is the most popular signalling protocol used in order to establish, maintain and terminate multimedia sessions between different participants. Nowadays, the security of SIP is becoming more and more important. Authentication is the most important security service required for SIP. To provide secure communication, many SIP authentication schemes have been proposed. Very recently, Farash et al. proposed a new SIP authentication protocol based on elliptic curve cryptography. They proved that their scheme is secured against different attacks. However, in this paper we show that Farash et al.'s protocol suffers from Denning-Sacco attacks and denial of service attacks. Moreover, we propose our solution to solve the problem. The security analysis shows that our proposed solution is more secure and can resist to various attacks.

Keywords: attack; authentication protocol; denial of service; Denning-Sacco; DoS; elliptic curve cryptography; security; session initiation protocol; SIP.

DOI: 10.1504/IJDSDE.2018.089097

International Journal of Dynamical Systems and Differential Equations, 2018 Vol.8 No.1/2, pp.77 - 94

Available online: 05 Jan 2018

Full-text access for editors Access for subscribers Purchase this article Comment on this article