A revised key agreement protocol based on chaotic maps

Very recently, Chen et al. proposed a security-enhanced key agreement protocol based on Chebyshev chaotic map. They claimed that the proposed protocol can achieve session key agreement shared among the server and user with security and users anonymity. Although, in this paper, we will prove that Chen et al.’s protocol cannot guarantee security and user anonymity against internal adversary who is a legal user. Furthermore, we give some improvements to dominate the mentioned shortcomings. The analysis shows that our proposed improvements are secure and efficient.

[1]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[2]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[3]  Wuu Yang,et al.  A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Xing-yuan Wang,et al.  A new compound mode of confusion and diffusion for block encryption of image based on chaos , 2010 .

[6]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[7]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[8]  Eun-Jun Yoon,et al.  Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .

[9]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[10]  Jiashu Zhang,et al.  Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..

[11]  Cheng-Chi Lee,et al.  An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.

[12]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[13]  Xiaofeng Liao,et al.  A chaos-based hash function with both modification detection and localization capabilities , 2010 .

[14]  Tzung-Her Chen,et al.  A security-enhanced key agreement protocol based on chaotic maps , 2013, Secur. Commun. Networks.

[15]  Peilin Hong,et al.  Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .

[16]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.

[17]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[18]  Debiao He,et al.  Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.

[19]  Zhenfeng Zhang,et al.  Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .

[20]  Long-Jye Sheu,et al.  A speech encryption using fractional chaotic systems , 2011 .

[21]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .

[22]  Di Xiao,et al.  Analysis and improvement of a chaos-based Hash function construction , 2010 .

[23]  Ranjan Bose,et al.  Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.

[24]  Eunjun Yoon,et al.  An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map , 2011 .

[25]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[26]  Tao Xiang,et al.  On the security of a novel key agreement protocol based on chaotic maps , 2009 .

[27]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.