Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps

Chaotic map has been receiving more and more attention in the cryptographic literature. In recent years, there are some scholars working on a particular type of authenticated key exchange protocol using chaotic map. Some of them identified a vulnerability of their precedences and presented their patching protocols. In this paper, we also identify a vulnerability in some of these authenticated key exchange protocols. We first redesign a protocol and optimize it in computation efficiency. Then we present the security analysis by a logic proof based on BAN logic.

[1]  Chien-Ming Chen,et al.  On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..

[2]  Ljupco Kocarev,et al.  Public-key encryption with chaos. , 2004, Chaos.

[3]  Xun Yi,et al.  Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.

[4]  Ljupco Kocarev,et al.  Public-Key Encryption Based on Chebyshev Polynomials , 2005 .

[5]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[6]  Hung-Min Sun,et al.  An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment , 2014 .

[7]  Cheng-Chi Lee,et al.  A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.

[8]  Hongfeng Zhu,et al.  A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem , 2015, J. Inf. Hiding Multim. Signal Process..

[9]  YoungJu Choie,et al.  Efficient identity-based authenticated key agreement protocol from pairings , 2005, Appl. Math. Comput..

[10]  Yixian Yang,et al.  Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .

[11]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[12]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[13]  Xuexian Hu,et al.  Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol , 2014 .

[14]  Cheng-Chi Lee,et al.  A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.

[15]  Hong-Feng Zhu Sustained and Authenticated of a Universal Construction for Multiple Key Agreement Based on Chaotic Maps with Privacy Preserving , 2016 .

[16]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[17]  Suman Bala,et al.  A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks , 2016, Int. J. Ad Hoc Ubiquitous Comput..

[18]  Hung-Min Sun,et al.  A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Hung-Min Sun,et al.  A provable authenticated group key agreement protocol for mobile environment , 2015, Inf. Sci..

[20]  Peng Gong,et al.  Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.

[21]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[22]  Xiong Li,et al.  Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .

[23]  Qi Xie,et al.  Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.

[24]  Kwok-Wo Wong,et al.  On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$ , 2010, IEEE Transactions on Computers.

[25]  Yan Zhang,et al.  A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model , 2016, J. Inf. Hiding Multim. Signal Process..

[26]  Saru Kumari,et al.  Cryptanalysis and improvement of a three‐party password‐based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2017, Int. J. Commun. Syst..