Skip to main content
Log in

A revised key agreement protocol based on chaotic maps

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Very recently, Chen et al. proposed a security-enhanced key agreement protocol based on Chebyshev chaotic map. They claimed that the proposed protocol can achieve session key agreement shared among the server and user with security and users anonymity. Although, in this paper, we will prove that Chen et al.’s protocol cannot guarantee security and user anonymity against internal adversary who is a legal user. Furthermore, we give some improvements to dominate the mentioned shortcomings. The analysis shows that our proposed improvements are secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  2. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 19861992 (2011)

    Article  MathSciNet  Google Scholar 

  3. Bergamo, P., DArco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 52(7), 13821393 (2005)

    Article  Google Scholar 

  4. Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615621 (2010)

    Google Scholar 

  5. Wang, X.Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Nonlinear Sci. Numer. Simul. 15(9), 247985 (2010)

    Google Scholar 

  6. Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587597 (2011)

    Google Scholar 

  7. Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103108 (2011)

    Google Scholar 

  8. Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 22542261 (2010)

    Article  MathSciNet  Google Scholar 

  9. Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 13381347 (2010)

    Article  MathSciNet  Google Scholar 

  10. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  11. Bose, R.: Novel public key encryption technique based on multiple chaotic systems. Phys. Rev. Lett. 95, 098702 (2005)

    Article  Google Scholar 

  12. Wang, K., Pei, W., Zhou, L., Cheung, Y., He, Z.: Security of public key encryption technique based on multiple chaotic system. Phys Lett. A 360, 259262 (2006)

    Google Scholar 

  13. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764768 (2008)

    Article  Google Scholar 

  14. Xiang, T., Wong, K., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672675 (2009)

    Article  Google Scholar 

  15. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669674 (2008)

    Article  Google Scholar 

  16. Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 40524057 (2010)

    Google Scholar 

  17. Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 12831289 (2009)

    Article  MathSciNet  Google Scholar 

  18. Yoon, E., Jeon, I.: An efficient and secure DifeHellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 23832389 (2011)

    Article  MathSciNet  Google Scholar 

  19. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC09, Dresden, p. 16 (2009)

  20. Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 27352740 (2012)

    Article  Google Scholar 

  21. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 27352740 (2012)

    Article  MathSciNet  Google Scholar 

  22. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(12), 7987 (2012)

    MathSciNet  Google Scholar 

  23. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769–780 (2000)

    Article  Google Scholar 

  24. He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 11491157 (2012)

    Article  MathSciNet  Google Scholar 

  25. Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0652-3

  26. Chen, T.H., Wang, B.J., Tu, T.Y., Wang, C.H.: A security-enhanced key agreement protocol based on chaotic maps. Secur. Comm. Networks. (2011). doi:10.1002/sec.537

  27. Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic Hash. Inf. Sci. 180(20), 4069–4074 (2010)

  28. Fee, G.J., Monagan, M.B.: Cryptography using Chebyshev polynomials. In: Proceedings of the Maple Summer Workshop (MSW’04) Burnaby (2004)

Download references

Acknowledgments

The authors would like to express their appreciation to Professor Ali H. Nayfeh and the anonymous referees for their valuable comments. This research was partially supported by the Iran Telecommunication Research Center (ITRC), under contract no. 500/19246.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamshid Bagherzadeh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jabbari, A., Bagherzadeh, J. A revised key agreement protocol based on chaotic maps. Nonlinear Dyn 78, 669–680 (2014). https://doi.org/10.1007/s11071-014-1467-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-014-1467-1

Keywords

Navigation