Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps

Recently, password based authenticated key exchange (or called PAKE for short) with chaotic maps has been received much attention for researchers. In 2013, Xie et al. proposed a three party PAKE scheme (based on chaotic maps). However, their scheme had been proved insecure by Lee et al. in 2015. In this paper, we first show that Xie et al.’s scheme is also vulnerable to a replay attack. To overcome this attack, we further propose an improvement based on their scheme. Finally, we demonstrate the security of our improvement with the BAN logic.

[1]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.

[2]  Mahmoud Ahmadian-Attari,et al.  An Enhanced Authenticated Key Agreement for Session Initiation Protocol , 2013, Inf. Technol. Control..

[3]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[4]  Chin-Chen Chang,et al.  Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..

[5]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[6]  Xuexian Hu,et al.  Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol , 2014 .

[7]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.

[8]  Mohammad Sabzinejad Farash,et al.  An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014, Nonlinear Dynamics.

[9]  Tian-Fu Lee,et al.  An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.

[10]  Peilin Hong,et al.  Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .

[11]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[12]  Kwok-Wo Wong,et al.  On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$ , 2010, IEEE Transactions on Computers.

[13]  Xiong Li,et al.  Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .

[14]  Qi Xie,et al.  Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.

[15]  Cheng-Chi Lee,et al.  A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.