Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

被引:48
作者
Islam, S. K. Hafizul [1 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani 333031, Rajasthan, India
关键词
Chaotic map; Smartcard; Password; Hash function; Session key; Key exchange protocol; USER AUTHENTICATION; SECURITY; SCHEME; CRYPTANALYSIS; IMPROVEMENT;
D O I
10.1016/j.ins.2015.03.050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the theory and application of Chebyshev polynomials have been studied extremely by the cryptographic research community; many symmetric and asymmetric cryptographic protocols have been designed based on extended chaotic maps. In this paper, a computation cost efficient and robust three party password-based authenticated key exchange (ECM-3PAKE) protocol with key confirmation has been designed using extended chaotic maps and smartcard. In this protocol, two users can establish a common session key with the help of a trusted server. The proposed protocol is shown to be provably secure in the random oracle model and formally validated through the simulation of Automated Validation of Internet Security Protocols and Applications (AVISPA) software. The simulation results from different model checkers of AVISPA proved that the protocol can withstand the active and passive attacks. Besides, the informal security analysis gives the evidence of security and functional efficiencies of the protocol. In addition, the comparative analysis illustrates that the protocol performs better than the existing protocols. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:104 / 130
页数:27
相关论文
共 50 条
  • [31] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [32] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603
  • [33] A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
    Farash, Mohammad Sabzinejad
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17) : 4897 - 4913
  • [34] Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
    Tu, Hang
    Shen, Han
    He, Debiao
    Chen, Jianhua
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (01): : 57 - 63
  • [35] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [36] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Hang Tu
    Neeraj Kumar
    Debiao He
    Jongsung Kim
    Changhoon Lee
    The Journal of Supercomputing, 2014, 70 : 224 - 235
  • [37] Smart card-based password authenticated key agreement protocol using chaotic maps
    Cheng, Ting-Fang
    Chang, Chin-Chen
    Lo, Yu-Ya
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [38] A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service
    Li, Chun-Ta
    Lee, Chin-Wen
    Shen, Jau-Ji
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 31 - 36
  • [39] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [40] Simple password-based three-party authenticated key exchange without server public keys
    Lee, Tian-Fu
    Hwang, Tzonelih
    INFORMATION SCIENCES, 2010, 180 (09) : 1702 - 1714