Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

被引:48
|
作者
Islam, S. K. Hafizul [1 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani 333031, Rajasthan, India
关键词
Chaotic map; Smartcard; Password; Hash function; Session key; Key exchange protocol; USER AUTHENTICATION; SECURITY; SCHEME; CRYPTANALYSIS; IMPROVEMENT;
D O I
10.1016/j.ins.2015.03.050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the theory and application of Chebyshev polynomials have been studied extremely by the cryptographic research community; many symmetric and asymmetric cryptographic protocols have been designed based on extended chaotic maps. In this paper, a computation cost efficient and robust three party password-based authenticated key exchange (ECM-3PAKE) protocol with key confirmation has been designed using extended chaotic maps and smartcard. In this protocol, two users can establish a common session key with the help of a trusted server. The proposed protocol is shown to be provably secure in the random oracle model and formally validated through the simulation of Automated Validation of Internet Security Protocols and Applications (AVISPA) software. The simulation results from different model checkers of AVISPA proved that the protocol can withstand the active and passive attacks. Besides, the informal security analysis gives the evidence of security and functional efficiencies of the protocol. In addition, the comparative analysis illustrates that the protocol performs better than the existing protocols. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:104 / 130
页数:27
相关论文
共 50 条
  • [21] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [22] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [23] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [24] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [25] Universally Composable Three Party Password-based Key Exchange Protocol
    Deng Miaolei
    Ma Jianfeng
    Le Fulong
    CHINA COMMUNICATIONS, 2009, 6 (03) : 150 - 155
  • [26] Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps
    Zheng, Yilong
    Hu, Shunfang
    Wei, Liangxiong
    Chen, Yanru
    Wang, Hao
    Yang, Yanbing
    Li, Yang
    Xu, Bingjie
    Huang, Wei
    Chen, Liangyin
    IEEE ACCESS, 2020, 8 : 66150 - 66162
  • [27] Universally Composable Three Party Password-based Key Exchange Protocol
    Deng Miaolei 1
    中国通信, 2009, 6 (03) : 150 - 155
  • [28] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [29] Threshold password-based authenticated key exchange using matrix
    Park, Chanil
    Lee, Soojin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 39 - 43
  • [30] Improved chaotic maps-based password-authenticated key agreement using smart cards
    Lin, Han-Yu
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) : 482 - 488