본문 바로가기
  • Home

Analysis and Improved Solution of Hussian et al.‘s Authentication Protocol for Digital Rights Management

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2023, 28(5), pp.67-74
  • DOI : 10.9708/jksci.2023.28.05.067
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science
  • Received : February 7, 2023
  • Accepted : April 25, 2023
  • Published : May 31, 2023

Mi-Og Park 1

1성결대학교

Accredited

ABSTRACT

In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

Citation status

* References for papers published after 2022 are currently being built.