Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

被引:48
|
作者
Islam, S. K. Hafizul [1 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani 333031, Rajasthan, India
关键词
Chaotic map; Smartcard; Password; Hash function; Session key; Key exchange protocol; USER AUTHENTICATION; SECURITY; SCHEME; CRYPTANALYSIS; IMPROVEMENT;
D O I
10.1016/j.ins.2015.03.050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the theory and application of Chebyshev polynomials have been studied extremely by the cryptographic research community; many symmetric and asymmetric cryptographic protocols have been designed based on extended chaotic maps. In this paper, a computation cost efficient and robust three party password-based authenticated key exchange (ECM-3PAKE) protocol with key confirmation has been designed using extended chaotic maps and smartcard. In this protocol, two users can establish a common session key with the help of a trusted server. The proposed protocol is shown to be provably secure in the random oracle model and formally validated through the simulation of Automated Validation of Internet Security Protocols and Applications (AVISPA) software. The simulation results from different model checkers of AVISPA proved that the protocol can withstand the active and passive attacks. Besides, the informal security analysis gives the evidence of security and functional efficiencies of the protocol. In addition, the comparative analysis illustrates that the protocol performs better than the existing protocols. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:104 / 130
页数:27
相关论文
共 50 条
  • [1] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132
  • [2] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [3] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)
  • [4] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    NONLINEAR DYNAMICS, 2014, 77 (1-2) : 399 - 411
  • [5] A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Chien-Ming
    SOFT COMPUTING, 2018, 22 (08) : 2495 - 2506
  • [6] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Khan, Muhammad Khurram
    Liao, Junguo
    Liang, Wei
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1209 - 1220
  • [7] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41): : 596 - 598+604
  • [8] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    Nonlinear Dynamics, 2014, 77 : 399 - 411
  • [9] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [10] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278