An extended chaotic-maps-based protocol with key agreement for multiserver environments

被引:0
作者
Cheng-Chi Lee
Der-Chyuan Lou
Chun-Ta Li
Che-Wei Hsu
机构
[1] Fu Jen Catholic University,Department of Library and Information Science
[2] Asia University,Department of Photonics & Communication Engineering
[3] Chang Gung University,Department of Computer Science and Information Engineering
[4] Tainan University of Technology,Department of Information Management
来源
Nonlinear Dynamics | 2014年 / 76卷
关键词
Chaotic maps; Computer network; Key exchange; Mutual authentication; Smart card;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the rapid development and growth of computer networks, there have been greater and greater demands for remote password authentication protocols. Recently, the focus has been on protocols for multiserver environments that run on smart cards. These protocols typically count on the nonce or timestamp to provide protection against the replay attack. However, as Tsaur et al. pointed out, these protocols have some security issues such as disturbance in clock synchronization and vulnerability to the man-in-the-middle attack. In order to solve the above problems, Tsaur et al. proposed a multiserver authentication scheme with key agreement in 2012, and they claimed that their scheme could effectively achieve password-authenticated key agreement while getting around the technical difficulty of implementing clock synchronization in multiserver environments. Unfortunately, we found out that Tsaur et al.’s protocol still has the following weaknesses: (1) inability to resist privileged insider attack, (2) inability to resist known-plaintext attack, (3) inability to provide user anonymity, and (4) lack of perfect forward secrecy. To fix these secure flaws of Tsaur et al.’s protocol, in this paper, we shall propose an improved multiserver authentication protocol with key agreement based on extended chaotic maps. We shall also offer formal proof of smooth execution of the improved authenticated key agreement protocol.
引用
收藏
页码:853 / 866
页数:13
相关论文
共 97 条
  • [1] Bergamo P.(2005)Security of public-key cryptosystems based on Chebyshev polynomials IEEE Trans. Circuits Syst. I, Regul. Pap. 52 1382-1393
  • [2] D’Arco P.(1989)A logic of authentication Proc. R. Soc. Lond. Ser. A, Math. Phys. Sci. 426 233-271
  • [3] De Santis A.(1993)Using smart cards to authenticate remote passwords Comput. Math. Appl. 26 19-27
  • [4] Kocarev L.(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
  • [5] Burrows M.(2009)Chaotic map based key agreement with/out clock synchronization Chaos Solitons Fractals 39 1283-1289
  • [6] Abadi M.(2012)Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol Nonlinear Dyn. 69 1149-1157
  • [7] Needham R.M.(2011)A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 367-374
  • [8] Chang C.-C.(2012)Note on design of improved password authentication and update scheme based on elliptic curve cryptography Math. Comput. Model. 55 1661-1664
  • [9] Hwang S.-J.(2000)A new remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 46 28-30
  • [10] Diffie W.(2009)A distributed active-vision network-space approach for the navigation of a car-like wheeled robot IEEE Trans. Ind. Electron. 56 846-855