On the security of a novel key agreement protocol based on chaotic maps

Abstract Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.’s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

[1]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[2]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[3]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[4]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[5]  Jinsheng Sun,et al.  A chaotic stream cipher and the usage in video protection , 2007 .

[6]  Arthur E. Oldehoeft,et al.  A survey of password mechanisms: Weaknesses and potential improvements. Part 2 , 1989, Comput. Secur..

[7]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[8]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.

[9]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[10]  X. Liao,et al.  A new chaotic cryptosystem , 2006 .

[11]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[12]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[13]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[14]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .