message is where we will be applying SRP for
authentication in SIP.
In our proposed new authentication scheme, a
SIP client will send its username in the initial
REGISTER message. Instead of replying with
standard SIP parameters in the Unauthorized
message, our implementation replaces those
parameters with SRP parameters. When the client
receives the Unauthorized message with the SRP
parameters it computes its public key as in SRP. At
the same time the registrar server also computes its
public key for an exchange with the client. As there
is no step for exchanging keys in the SIP
authentication, we have defined an extra SIP
message for the exchange of client and server public
keys. When both parties have the other’s public key
they compute the session key, and the client
generates a response value encrypted using the
computed session key and sends it to the registrar
server in the new REGISTER message. Thus there is
no need to define a new SIP message for this step.
When the new REGISTER message arrives at the
registrar server, it verifies the authenticity of the
client using the response value contained in the
message. The flow of our SRP based new SIP
authentication scheme is given in Figure 3.
Figure 3: SIP authentication with SRP.
6 CONCLUSIONS
SIP has a wide and increasing area of applications
and SIP security is one of the most important details
which must not be overlooked. Because of its simple
design initial implementations of SIP protocol did
not give the first priority to the security, but today it
is inarguable that security is of utmost concern for
any IP based application. So, by adding only a new
SIP message and replacing the parameters in two
existing SIP messages we have demonstrated that
SRP can be used for SIP authentication without
having the client password to be sent in any form
over the underlying communication network.
For future work we will modify the SIP
authentication mechanism to provide for server
authenticity as well.
REFERENCES
Bellovin, S.M. and Merritt, M., Augmented encrypted key
exchange: A password-based protocol secure against
dictionary attacks and password file compromise.
Technical report, AT&T Bell Laboratories, 1994.
Diffie W., Hellman M.E., New directions in cryptography.
IEEE Transactions on Information Theory, IT-
22(6):644{654, November 1976.
Franks J., Hallam-Baker P., Hostetler J., Lawrence S.,
Leach P., Luotonen A., Stewart L., HTTP
Authentication: Basic and Digest Access
Authentication, RFC 2617, June 1999
Jablon D. Strong password-only authenticated key
exchange. Computer Communication Review,
26(5):5{26, October 1996.
Steiner M., Tsudik G., and Waidner M., Refinement and
extension of encrypted key exchange. ACM Operating
Systems Review, 29(3), July 1995.
Wu T., "The Secure Remote Password Protocol", March
1998
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC
3261, June 2002.
Qi, Q., Study of Digest Authentication for Session
Initiation Protocol, SITE, University of Ottowa,
(2003)
Srinivasan R., Vaidehi V., Harish K., LakshmiNarasimhan
K., LokeshwerBabu S., Srikanth V. (2005)
“Authentication of Signalling in VoIP Applications”,
2005 Asia-Pacific Conference on Communications, 3 -
5 October 2005, Perth, Western Australia.
Holger S., Chi-Tai D., Franz J. H., “Proxy-based Security
for the Session Initiation Protocol (SIP)”, Second
International Conference on Systems and Networks
Communications, IEEE, 2007
Durlanik A., Sogukpinar I., SIP Authentication Scheme
using Ecdh, Proceedings Of World Academy Of
Science, Engineering And Technology, Volume 8,
October 2005 ISSN 1307-6884
APPLYING SRP ON SIP AUTHENTICATION
231