Security of a key agreement protocol based on chaotic maps
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al....
| Main Author: | Han, Song |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/40506 |
Similar Items
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022)
by: Mahad, Zahari, et al.
Published: (2022)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022)
by: Hasan, Md Mehedi, et al.
Published: (2022)
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)
by: Li, Y., et al.
Published: (2009)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
An efficient authentication and key agreement protocol for 4G (LTE) networks
by: Alezabi, Kamal Ali, et al.
Published: (2014)
by: Alezabi, Kamal Ali, et al.
Published: (2014)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
A secure data authentication in wireless body area network
for health monitoring using electrocardiogram-based
key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
by: AlRijeb, Mothena Fakhri Shaker, et al.
Published: (2025)
by: AlRijeb, Mothena Fakhri Shaker, et al.
Published: (2025)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Application adaptive exponential synchronization of chaotic dynamical systems in secure communications
by: Maheri, Mahmoud, et al.
Published: (2017)
by: Maheri, Mahmoud, et al.
Published: (2017)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)
by: Alzaidi, Amer Awad, et al.
Published: (2018)
A step variational iteration method for solving non-chaotic and chaotic systems
by: Yulita Molliq, R, et al.
Published: (2013)
by: Yulita Molliq, R, et al.
Published: (2013)
Carbon prices for meeting the Paris Agreement and their impact on key metals
by: Tost, Michael, et al.
Published: (2020)
by: Tost, Michael, et al.
Published: (2020)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
Synchronization and antisynchronization protocol design of chaotic nonlinear gyros: an adaptive integral sliding mode approach
by: Rehman, Fazal ur, et al.
Published: (2019)
by: Rehman, Fazal ur, et al.
Published: (2019)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Similar Items
-
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007) -
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022) -
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015) -
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022) -
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)