Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A critical analysis and improvement of advanced access content system drive-host authentication

A critical analysis and improvement of advanced access content system drive-host authentication This article presents a critical analysis of the Advanced Access Content System drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications (based on the ISO and the SIGMA protocols) of the scheme are suggested in order to provide better security. A proof of security of the modified scheme based on the ISO protocol is also presented. The modified schemes achieve better efficiency than the original scheme. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Applied Cryptography Inderscience Publishers

A critical analysis and improvement of advanced access content system drive-host authentication

Loading next page...
 
/lp/inderscience-publishers/a-critical-analysis-and-improvement-of-advanced-access-content-system-Ny9QhSky5N
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1753-0563
eISSN
1753-0571
DOI
10.1504/IJACT.2009.023464
Publisher site
See Article on Publisher Site

Abstract

This article presents a critical analysis of the Advanced Access Content System drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications (based on the ISO and the SIGMA protocols) of the scheme are suggested in order to provide better security. A proof of security of the modified scheme based on the ISO protocol is also presented. The modified schemes achieve better efficiency than the original scheme.

Journal

International Journal of Applied CryptographyInderscience Publishers

Published: Jan 1, 2009

There are no references for this article.