Chaotic map based key agreement with/out clock synchronization

In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphr...

Full description

Bibliographic Details
Main Authors: Han, Song, Chang, Elizabeth
Format: Journal Article
Published: Elsevier 2007
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/34851
_version_ 1848754335419203584
author Han, Song
Chang, Elizabeth
author_facet Han, Song
Chang, Elizabeth
author_sort Han, Song
building Curtin Institutional Repository
collection Online Access
description In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.
first_indexed 2025-11-14T08:38:46Z
format Journal Article
id curtin-20.500.11937-34851
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T08:38:46Z
publishDate 2007
publisher Elsevier
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-348512017-09-13T15:41:03Z Chaotic map based key agreement with/out clock synchronization Han, Song Chang, Elizabeth guessing attack hash - function chaotic map Chaos clock synchronization mutual authentication key agreement In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established. 2007 Journal Article http://hdl.handle.net/20.500.11937/34851 10.1016/j.chaos.2007.06.030 Elsevier restricted
spellingShingle guessing attack
hash - function
chaotic map
Chaos
clock synchronization
mutual authentication
key agreement
Han, Song
Chang, Elizabeth
Chaotic map based key agreement with/out clock synchronization
title Chaotic map based key agreement with/out clock synchronization
title_full Chaotic map based key agreement with/out clock synchronization
title_fullStr Chaotic map based key agreement with/out clock synchronization
title_full_unstemmed Chaotic map based key agreement with/out clock synchronization
title_short Chaotic map based key agreement with/out clock synchronization
title_sort chaotic map based key agreement with/out clock synchronization
topic guessing attack
hash - function
chaotic map
Chaos
clock synchronization
mutual authentication
key agreement
url http://hdl.handle.net/20.500.11937/34851