An efficient and secure two-party key agreement protocol based on chaotic maps
نویسندگان
چکیده
Secure communication is a matter of genuine concern that includes means whereby entities can share information without a third party’s interception. Key agreement protocols are one of the common approaches in which two or more parties can agree upon a key, which precludes undesired third parties from forcing a key choice on them. Over the past decade, chaos-based key agreement protocols have been studied and employed widely. Recently, Yoon and Jeon proposed a novel key agreement protocol based on chaotic maps and claimed security and practicality for their protocol. We find that Yoon-Jeon’s protocol suffers certain issues: (1) It introduces a trusted third party whose very presence increases the implementation cost. (2) requires a multiplicity of encryption/decryption computations and (3) does not protect the user’s anonymity. In order to overcome these problems, we present an enhanced key agreement protocol with user anonymity. Theoretical analysis demonstrates that the proposed protocol is efficient and resists current attacks.
منابع مشابه
Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...
متن کاملKey agreement protocol based on extended chaotic maps with anonymous authentication
Key agreement protocol is used to establish shared secret key for the network system, which is quite important to guarantee secure communication. This paper proposes a two-party key agreement protocol. In order to improve the efficiency and enhance the security, we utilize extended chaotic maps to generate the shared key, which can be used to encrypt and decrypt the transmitted messages in the ...
متن کاملOptimized Key Agreement Protocol Based on Chaotic
—Many key agreement protocols based on chaotic maps have been proposed to guarantee secure communications in the network. Recently, Wang et al. proposed a new key agreement protocol based on chaotic maps. But some issues exist in this protocol, such as anonymity, key distribution and management, and password problems. In order to improve the performance of Wang et al.’s protocol, this paper pr...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA Novel Client-to-Client Password-Authenticated Key Exchange Protocol Using Chaotic Maps in The Standard Model
Until now, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.02789 شماره
صفحات -
تاریخ انتشار 2018