Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards

被引:0
作者
Wei-Chuen Yau
Raphael C.-W. Phan
机构
[1] Multimedia University,Faculty of Engineering
来源
Nonlinear Dynamics | 2015年 / 79卷
关键词
Authentication; Chebyshev polynomials; Chaotic maps; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow communication parties to exchange session keys in an authentic and secure manner. Guo and Chang recently proposed a novel password-authenticated key agreement protocol using smart card based on chaotic maps. They claimed that the protocol achieves the security goal of mutual authentication, as well as other essential security requirements. In this paper, we show that this protocol is susceptible to key-compromise impersonation and parallel session attacks. We also identify two weaknesses in the password change phase of the protocol that leads to authentication with old password and denial of service, respectively.
引用
收藏
页码:809 / 821
页数:12
相关论文
共 107 条
[1]  
Algehawi MB(2010)A new identity based encryption (IBE) scheme using extended chebyshev polynomial over finite fields Phys. Lett. A 374 4670-4674
[2]  
Azman S(2006)Some basic cryptographic requirements for chaos-based cryptosystems Int. J. Bifurcat. Chaos 16 2129-2151
[3]  
Alvarez G(2005)Security of public-key cryptosystems based on chebyshev polynomials IEEE Trans. Circuits Syst. I Regul. Pap. 52 1382-1393
[4]  
Li S(2007)More on security of public-key cryptosystems based on chebyshev polynomials IEEE Trans. Circuits Syst. II Express Briefs 54 795-799
[5]  
Bergamo P(2008)Three weaknesses in a simple three-party key exchange protocol Inf. Sci. 178 220-229
[6]  
D’Arco P(2010)Analysis and improvement of a chaos-based hash function construction Commun. Nonlinear Sci. Numer. Simul. 15 1338-1347
[7]  
De Santis A(2005)Robust remote authentication scheme with smart cards Comput. Secur. 24 619-628
[8]  
Kocarev L(2012)A secure chaotic maps-based key agreement protocol without using smart cards Nonlinear Dyn. 70 2401-2406
[9]  
Cheong KY(2011)Modeling key compromise impersonation attacks on group key exchange protocols ACM Trans. Inf. Syst. Secur. 14 28:1-28:24
[10]  
Koshiba T(2013)Chaotic maps-based password-authenticated key agreement using smart cards Commun. Nonlinear Sci. Numer. Simul. 18 1433-1440