A novel key agreement protocol based on chaotic maps

Based on the semi-group property of Chebyshev chaotic map and some effective improvements of our original protocol, we propose a novel chaotic maps-based key agreement protocol which is proved to be secure, feasible and extensible.

[1]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[2]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[3]  Xiaofeng Liao,et al.  A digital secure image communication scheme based on the chaotic Chebyshev map , 2004, Int. J. Commun. Syst..

[4]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[5]  Alfredo De Santis,et al.  Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..

[6]  M. Baptista Cryptography with chaos , 1998 .

[7]  Roy Tenny,et al.  Using distributed nonlinear dynamics for public key encryption. , 2003, Physical review letters.

[8]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[9]  Nevenko Zunic,et al.  Methods for Protecting Password Transmission , 2000, Comput. Secur..

[10]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[11]  Gonzalo Álvarez,et al.  Breaking network security based on synchronized chaos , 2004, Comput. Commun..

[12]  Guanrong Chen,et al.  A digital secure image communication scheme based on the chaotic Chebyshev map: Research Articles , 2004 .

[13]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[14]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[15]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[16]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.

[17]  Jyh-haw Yeh,et al.  Key assignment for enforcing access control policy exceptions in distributed systems , 2003, Inf. Sci..

[18]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .