Chaotic map based key agreement with/out clock synchronization
In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphr...
| Main Authors: | , |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2007
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/34851 |
| _version_ | 1848754335419203584 |
|---|---|
| author | Han, Song Chang, Elizabeth |
| author_facet | Han, Song Chang, Elizabeth |
| author_sort | Han, Song |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established. |
| first_indexed | 2025-11-14T08:38:46Z |
| format | Journal Article |
| id | curtin-20.500.11937-34851 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:38:46Z |
| publishDate | 2007 |
| publisher | Elsevier |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-348512017-09-13T15:41:03Z Chaotic map based key agreement with/out clock synchronization Han, Song Chang, Elizabeth guessing attack hash - function chaotic map Chaos clock synchronization mutual authentication key agreement In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established. 2007 Journal Article http://hdl.handle.net/20.500.11937/34851 10.1016/j.chaos.2007.06.030 Elsevier restricted |
| spellingShingle | guessing attack hash - function chaotic map Chaos clock synchronization mutual authentication key agreement Han, Song Chang, Elizabeth Chaotic map based key agreement with/out clock synchronization |
| title | Chaotic map based key agreement with/out clock synchronization |
| title_full | Chaotic map based key agreement with/out clock synchronization |
| title_fullStr | Chaotic map based key agreement with/out clock synchronization |
| title_full_unstemmed | Chaotic map based key agreement with/out clock synchronization |
| title_short | Chaotic map based key agreement with/out clock synchronization |
| title_sort | chaotic map based key agreement with/out clock synchronization |
| topic | guessing attack hash - function chaotic map Chaos clock synchronization mutual authentication key agreement |
| url | http://hdl.handle.net/20.500.11937/34851 |