DOI QR코드

DOI QR Code

A NTRU-based Authentication and Key Distribution Protocol for SIP

SIP에서 NTRU 기반 인증 및 키 분배 프로토콜

  • Received : 2017.09.13
  • Accepted : 2017.10.30
  • Published : 2017.11.30

Abstract

The SIP(Session Initiation Protocol) is an application layer call signaling protocol which can create, modify and terminate the session of user, and provides various services in combination with numerous existing protocols. However, most of cryptosystems for SIP cannot prevent quantum computing attack because they have used ECC(Elliptic Curve Cryptosystem). In this paper, we propose a NTRU based authentication and key distribution protocol for SIP in order to protect quantum computing attacks. The proposed protocol can prevent various attacks such as quantum computing attack, server spoofing attack, man-in-the middle attack and impersonation attack anonymity, and our protocol can provide user's anonymity.

Keywords

References

  1. IETF, HTTP Authentication: Basic and Digest Access Authentication, RFC 2617, 1999.
  2. IETF, SIP: Session Initiation Protocol, RFC3261, 2002.
  3. D. Mishra and A.K. Das, “A Secure and Efficient ECC-based User Anonymity-preserving Session Initiation Authentication Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 9, No. 1, pp. 171-192, 2016. https://doi.org/10.1007/s12083-014-0321-z
  4. H. Arshad and M. Nikooghadam, “An Efficient Sand Secure Authentication and Key Agreement Scheme for Session Initiation Protocol Using ECC,” Multimedia Tools and Applications, Vol. 75, No. 1, pp. 181-197, 2016. https://doi.org/10.1007/s11042-014-2282-x
  5. P.W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124-134, 1994.
  6. L.K. Grover, "A Fast Quantum Mechanical Algorithm for Database Search," Proceedings of the Twenty-eighth Annual Association for Computing Machinery Symposium on the Theory of Computing, pp. 212-219, 1996.
  7. ETSI, Quantum Safe Cryptography and Security, ISBN NO. 979-10-92620-09-0, 2015.
  8. NIST, Report on Post-Quantum Cryptography, IR 8105, 2016.
  9. J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Proceeding of International Algorithmic Number Theory Symposium, Vol. 1423, pp. 267-288, 1998.
  10. IEEE P1363.1, Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, International Association for Cryptologic Research Eprint Archive, 2008.
  11. S.H. Jeong, K.S. Park, K.K. Lee, and Y.H. Park, "Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments," Journal of Korea Multimedia Society, Vol. 20, No. 8, pp. 1321-1329, 2017. https://doi.org/10.9717/KMMS.2017.20.8.1321
  12. H. Tu, N. Kumar, N. Chilamkurti, and S. Rho, “An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card,” Peer-to-Peer Networking and Appications, Vol. 8, No. 5, pp. 903-910, 2014.
  13. NIST, Security Considerations for Voice Over IP Systems, SP 800-58, 2005.