Security problems with a chaos-based deniable authentication scheme

Abstract Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

[1]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[3]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[4]  Jonathan Katz,et al.  Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications , 2003, EUROCRYPT.

[5]  Zhi-Hong Guan,et al.  Cryptosystem using chaotic keys , 2005 .

[6]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[7]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[8]  X. Mou,et al.  Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems , 2003 .

[9]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[10]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[11]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[12]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[13]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[14]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[15]  M. Baptista Cryptography with chaos , 1998 .

[16]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[17]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.