Security of a key agreement protocol based on chaotic maps

Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al....

Full description

Bibliographic Details
Main Author: Han, Song
Format: Journal Article
Published: Elsevier 2008
Online Access:http://hdl.handle.net/20.500.11937/40506
_version_ 1848755889633230848
author Han, Song
author_facet Han, Song
author_sort Han, Song
building Curtin Institutional Repository
collection Online Access
description Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.?s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server?s communications.
first_indexed 2025-11-14T09:03:29Z
format Journal Article
id curtin-20.500.11937-40506
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T09:03:29Z
publishDate 2008
publisher Elsevier
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-405062017-09-13T15:59:41Z Security of a key agreement protocol based on chaotic maps Han, Song Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.?s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server?s communications. 2008 Journal Article http://hdl.handle.net/20.500.11937/40506 10.1016/j.chaos.2007.01.017 Elsevier fulltext
spellingShingle Han, Song
Security of a key agreement protocol based on chaotic maps
title Security of a key agreement protocol based on chaotic maps
title_full Security of a key agreement protocol based on chaotic maps
title_fullStr Security of a key agreement protocol based on chaotic maps
title_full_unstemmed Security of a key agreement protocol based on chaotic maps
title_short Security of a key agreement protocol based on chaotic maps
title_sort security of a key agreement protocol based on chaotic maps
url http://hdl.handle.net/20.500.11937/40506