Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From crypt...
| Main Authors: | Han, Song, Chang, Elizabeth, Dillon, Tharam S, Hwang, M., Lee, C. |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/19133 |
Similar Items
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Using non-commutative monoids for construct three-party key establishment
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Chaos synchronization of logistics, Qi and Maxwell-Bloch systems for chaos-based communication
by: Abdul Fataf, Nur Aisyah
Published: (2018)
by: Abdul Fataf, Nur Aisyah
Published: (2018)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
An authenticated self-healing key distribution scheme based on bilinear pairings
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Complete decompositions of dihedral groups and group based key exchange protocol
by: Huey, Voon Chen, et al.
Published: (2021)
by: Huey, Voon Chen, et al.
Published: (2021)
Security of a key agreement protocol based on chaotic maps
by: Han, Song
Published: (2008)
by: Han, Song
Published: (2008)
Protocol for the development of a food stress index to identify households most at risk of food insecurity in Western Australia
by: Landrigan, T., et al.
Published: (2019)
by: Landrigan, T., et al.
Published: (2019)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Use of protein ontology to enable data exchange for complex proteomic experiments
by: Sidhu, Amandeep, et al.
Published: (2008)
by: Sidhu, Amandeep, et al.
Published: (2008)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Time synchronization protocols and approaches
by: Hasan, M, et al.
Published: (2011)
by: Hasan, M, et al.
Published: (2011)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Counterfactual protocol within device independent framework and its insecurity
by: Kamaruddin, Suhaili, et al.
Published: (2020)
by: Kamaruddin, Suhaili, et al.
Published: (2020)
Communication scheme using a hyperchaotic semiconductor laser model: chaos shift key revisited
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2017)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2017)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Femtocell Network Time Synchronization Protocols and Schemes
by: Hasan, M.K., et al.
Published: (2012)
by: Hasan, M.K., et al.
Published: (2012)
Mengenal chaos for beginners
by: Sardar, Ziauddin, et al.
Published: (2001)
by: Sardar, Ziauddin, et al.
Published: (2001)
On rare mutation and chaos
by: Ganikhodjaev, Nasir, et al.
Published: (2013)
by: Ganikhodjaev, Nasir, et al.
Published: (2013)
Similar Items
-
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007) -
Using non-commutative monoids for construct three-party key establishment
by: Han, Song, et al.
Published: (2008) -
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008) -
Chaos synchronization of logistics, Qi and Maxwell-Bloch systems for chaos-based communication
by: Abdul Fataf, Nur Aisyah
Published: (2018) -
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)