Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing

被引:47
作者
Farash, Mohammad Sabzinejad [1 ]
Attari, Mahmoud Ahmadian [2 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Elect & Comp Engn, Tehran, Iran
关键词
Cryptography; Chaos; Key agreement protocol; Password-guessing attack; SECURITY PROBLEMS; SCHEME;
D O I
10.1007/s11071-013-1204-1
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Recently, Gong et al. (Nonlinear Dyn, doi:10.1007/s11071-012-0628-3" , 2012) proposed a chaotic map-based key agreement protocol without using smart cards. They claimed that the protocol is secure against password-guessing attacks. However, we show that Gong et al.'s protocol is vulnerable to partition attacks, whereby the adversary can guess the correct password off-line. We also demonstrate that the protocol suffers from a a stolen-verifier attack along with password change pitfalls. Thereafter, we proposed an chaotic map-based key agreement protocol without using smart cards to conquer the mentioned weaknesses. The security analysis of the proposed protocol shows that it is suitable for the applications with higher security requirement.
引用
收藏
页码:1203 / 1213
页数:11
相关论文
共 41 条
[1]   Security problems with a chaos-based deniable authentication scheme [J].
Alvarez, G .
CHAOS SOLITONS & FRACTALS, 2005, 26 (01) :7-11
[2]   A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Ahadpour, S. ;
Mahmodi, H. ;
Akhavan, A. .
PHYSICS LETTERS A, 2007, 366 (4-5) :391-396
[3]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[4]   Novel public key encryption technique based on multiple chaotic systems [J].
Bose, R .
PHYSICAL REVIEW LETTERS, 2005, 95 (09)
[5]  
Boyd C., 2003, PROTOCOL AUTHENTICAT
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]   An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps [J].
Chen, Guo ;
Chen, Yong ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2007, 31 (03) :571-579
[8]   A security-enhanced key agreement protocol based on chaotic maps [J].
Chen, Tzung-Her ;
Wang, Bing-Jian ;
Tu, Tai-Yuan ;
Wang, Chih-Hung .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) :108-114
[9]   Analysis and improvement of a chaos-based Hash function construction [J].
Deng, Shaojiang ;
Li, Yantao ;
Xiao, Di .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (05) :1338-1347
[10]  
Farash M.S., 2014, INT J NETW SECUR, V16, P143