An anonymous key agreement protocol based on chaotic maps

被引:109
作者
Niu, Yujun [1 ]
Wang, Xingyuan [1 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116024, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Key agreement protocol; Anonymity; Public key cryptography; Chaotic map; CRYPTANALYSIS; SECURITY;
D O I
10.1016/j.cnsns.2010.08.015
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently Tseng et al proposed a novel key agreement protocol based on chaotic maps They claimed that the protocol achieved session key agreement between a server and a user and allowed the user to anonymously Interact with the server This paper however will demonstrate that Tseng et al s protocol can not guarantee user anonymity and protocol security against an insider adversary who is a legal user and It can not provide perfect forward secrecy Furthermore the current paper presents a new key agreement protocol based on Chebyshev chaotic map in order to conquer these problems In contrast with Tseng et al s protocol the proposed protocol is more secure and preserves user anonymity (C) 2010 Elsevier B V All rights reserved
引用
收藏
页码:1986 / 1992
页数:7
相关论文
共 19 条
[1]  
[Anonymous], USING PASSPHRASE CON
[2]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], P IEEE S CIRC SYST I
[4]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]   An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps [J].
Chen, Guo ;
Chen, Yong ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2007, 31 (03) :571-579
[7]   Analysis and improvement of a chaos-based Hash function construction [J].
Deng, Shaojiang ;
Li, Yantao ;
Xiao, Di .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (05) :1338-1347
[8]   Chaotic map based key agreement with/out clock synchronization [J].
Han, S. ;
Chang, E. .
CHAOS SOLITONS & FRACTALS, 2009, 39 (03) :1283-1289
[9]   Security of a key agreement protocol based on chaotic maps [J].
Han, Song .
CHAOS SOLITONS & FRACTALS, 2008, 38 (03) :764-768
[10]   Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations [J].
Li, Chengqing ;
Li, Shujun ;
Alvarez, Gonzalo ;
Chen, Guanrong ;
Lo, Kwok-Tung .
PHYSICS LETTERS A, 2007, 369 (1-2) :23-30