Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From crypt...
| Main Authors: | , , , , |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/19133 |
| _version_ | 1848749946006667264 |
|---|---|
| author | Han, Song Chang, Elizabeth Dillon, Tharam S Hwang, M. Lee, C. |
| author_facet | Han, Song Chang, Elizabeth Dillon, Tharam S Hwang, M. Lee, C. |
| author_sort | Han, Song |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From cryptographic point of view, their key exchange protocol is a key agreement protocol. Klein et al. claimed that their key agreement can be carried out over a public channel. In order to increase the key space and decrease the precision of the calculation, they made an extension of the system to anetwork of N Lorenz equations. In this paper, we will provide a cryptanalysis of their key agreement protocol. We will first point out some weaknesses, and then show that their protocol is not secure against several attacks including impersonation attack. |
| first_indexed | 2025-11-14T07:29:00Z |
| format | Journal Article |
| id | curtin-20.500.11937-19133 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:29:00Z |
| publishDate | 2009 |
| publisher | Elsevier |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-191332017-09-13T16:01:02Z Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization Han, Song Chang, Elizabeth Dillon, Tharam S Hwang, M. Lee, C. Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From cryptographic point of view, their key exchange protocol is a key agreement protocol. Klein et al. claimed that their key agreement can be carried out over a public channel. In order to increase the key space and decrease the precision of the calculation, they made an extension of the system to anetwork of N Lorenz equations. In this paper, we will provide a cryptanalysis of their key agreement protocol. We will first point out some weaknesses, and then show that their protocol is not secure against several attacks including impersonation attack. 2009 Journal Article http://hdl.handle.net/20.500.11937/19133 10.1016/j.chaos.2007.10.050 Elsevier restricted |
| spellingShingle | Han, Song Chang, Elizabeth Dillon, Tharam S Hwang, M. Lee, C. Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title | Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title_full | Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title_fullStr | Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title_full_unstemmed | Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title_short | Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| title_sort | identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization |
| url | http://hdl.handle.net/20.500.11937/19133 |