Abstract
Very recently, Chen et al. proposed a security-enhanced key agreement protocol based on Chebyshev chaotic map. They claimed that the proposed protocol can achieve session key agreement shared among the server and user with security and users anonymity. Although, in this paper, we will prove that Chen et al.’s protocol cannot guarantee security and user anonymity against internal adversary who is a legal user. Furthermore, we give some improvements to dominate the mentioned shortcomings. The analysis shows that our proposed improvements are secure and efficient.
Similar content being viewed by others
References
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 19861992 (2011)
Bergamo, P., DArco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 52(7), 13821393 (2005)
Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615621 (2010)
Wang, X.Y., Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Nonlinear Sci. Numer. Simul. 15(9), 247985 (2010)
Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587597 (2011)
Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103108 (2011)
Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 22542261 (2010)
Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 13381347 (2010)
Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)
Bose, R.: Novel public key encryption technique based on multiple chaotic systems. Phys. Rev. Lett. 95, 098702 (2005)
Wang, K., Pei, W., Zhou, L., Cheung, Y., He, Z.: Security of public key encryption technique based on multiple chaotic system. Phys Lett. A 360, 259262 (2006)
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764768 (2008)
Xiang, T., Wong, K., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672675 (2009)
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669674 (2008)
Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 40524057 (2010)
Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 12831289 (2009)
Yoon, E., Jeon, I.: An efficient and secure DifeHellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 23832389 (2011)
Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC09, Dresden, p. 16 (2009)
Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 27352740 (2012)
Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 27352740 (2012)
Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(12), 7987 (2012)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769–780 (2000)
He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 11491157 (2012)
Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0652-3
Chen, T.H., Wang, B.J., Tu, T.Y., Wang, C.H.: A security-enhanced key agreement protocol based on chaotic maps. Secur. Comm. Networks. (2011). doi:10.1002/sec.537
Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic Hash. Inf. Sci. 180(20), 4069–4074 (2010)
Fee, G.J., Monagan, M.B.: Cryptography using Chebyshev polynomials. In: Proceedings of the Maple Summer Workshop (MSW’04) Burnaby (2004)
Acknowledgments
The authors would like to express their appreciation to Professor Ali H. Nayfeh and the anonymous referees for their valuable comments. This research was partially supported by the Iran Telecommunication Research Center (ITRC), under contract no. 500/19246.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jabbari, A., Bagherzadeh, J. A revised key agreement protocol based on chaotic maps. Nonlinear Dyn 78, 669–680 (2014). https://doi.org/10.1007/s11071-014-1467-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-014-1467-1