Cryptanalysis of Two Authentication Scheme for DRM System

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet based content distribution facilitates efficient platform for digital content (movies, music, text, software) trades to the remote users. It makes electronic commerce more profiting and user-friendly. However, digital content can be easily copied and redistributed over the network. At the same time, digital rights management (DRM) system emerges in the response of these drawbacks. It tries to ensure authorized content distribution so that copyright protection can be assured. Although, most of the existing DRM system supports only one way authentication, where the server verifies user's authenticity and user simply assumed that he is interacting with the correct server. It may cause server spoofing attack. In 2006, Fan et al. proposed a certificate based authentication scheme for DRM system. In 2009, Wang at al. presented a smart card based authentication scheme for DRM system using biometric keys in which user and server can mutually authenticate each other. We analyze both the schemes and show that both the schemes fail to prove their claim of resistance to most common attacks. Fan et al.'s scheme has failed to resist known session specific temporary information attack and replay attack. Moreover, it does not ensure perfect forward secrecy. Wang et al.'s scheme does not withstand insider attack and known session specific temporary information attack and have an inefficient login phase. © Springer-Verlag Berlin Heidelberg 2014.

Cite

CITATION STYLE

APA

Mishra, D., & Mukhopadhyay, S. (2014). Cryptanalysis of Two Authentication Scheme for DRM System. In Communications in Computer and Information Science (Vol. 420 CCIS, pp. 184–191). Springer Verlag. https://doi.org/10.1007/978-3-642-54525-2_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free