@article{ART002960837},
author={Mi-Og Park},
title={Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2023},
volume={28},
number={5},
pages={67-74},
doi={10.9708/jksci.2023.28.05.067}
TY - JOUR
AU - Mi-Og Park
TI - Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management
JO - Journal of The Korea Society of Computer and Information
PY - 2023
VL - 28
IS - 5
PB - The Korean Society Of Computer And Information
SP - 67
EP - 74
SN - 1598-849X
AB - In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user.
Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.
KW - DRM;Authentication;Insider attack;Smart card;User impersonation attack
DO - 10.9708/jksci.2023.28.05.067
ER -
Mi-Og Park. (2023). Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management. Journal of The Korea Society of Computer and Information, 28(5), 67-74.
Mi-Og Park. 2023, "Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management", Journal of The Korea Society of Computer and Information, vol.28, no.5 pp.67-74. Available from: doi:10.9708/jksci.2023.28.05.067
Mi-Og Park "Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management" Journal of The Korea Society of Computer and Information 28.5 pp.67-74 (2023) : 67.
Mi-Og Park. Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management. 2023; 28(5), 67-74. Available from: doi:10.9708/jksci.2023.28.05.067
Mi-Og Park. "Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management" Journal of The Korea Society of Computer and Information 28, no.5 (2023) : 67-74.doi: 10.9708/jksci.2023.28.05.067
Mi-Og Park. Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management. Journal of The Korea Society of Computer and Information, 28(5), 67-74. doi: 10.9708/jksci.2023.28.05.067
Mi-Og Park. Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management. Journal of The Korea Society of Computer and Information. 2023; 28(5) 67-74. doi: 10.9708/jksci.2023.28.05.067
Mi-Og Park. Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management. 2023; 28(5), 67-74. Available from: doi:10.9708/jksci.2023.28.05.067
Mi-Og Park. "Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management" Journal of The Korea Society of Computer and Information 28, no.5 (2023) : 67-74.doi: 10.9708/jksci.2023.28.05.067