Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol

被引:13
|
作者
Hu, Xuexian [1 ,2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国博士后科学基金; 中国国家自然科学基金;
关键词
Chaotic maps; Key exchange protocol; Anonymity; Man-in-the-middle attack;
D O I
10.1007/s11071-014-1515-x
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Recently, Lee et al. (Nonlinear Dyn, 73(1-2):125-132, 2013) proposed a three party password authenticated key exchange with user anonymity by utilizing extended chaotic maps. They claimed that their protocol is more secure than previously proposed schemes. In this paper, our analysis shows that Lee et al.'s protocol suffers from two kinds of attacks: (1) man-in-the-middle attack, and (2) user anonymity attack. To overcome these weakness, we propose an enhanced protocol that can resist the attacks described and yet with comparable efficiency.
引用
收藏
页码:1293 / 1300
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [2] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [3] Chaotic maps-based three-party password-authenticated key agreement scheme
    Qi Xie
    Jianmin Zhao
    Xiuyuan Yu
    Nonlinear Dynamics, 2013, 74 : 1021 - 1027
  • [4] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [5] Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
    Lee, Youngsook
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 151 - 160
  • [6] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Xiong Li
    Jianwei Niu
    Saru Kumari
    Muhammad Khurram Khan
    Junguo Liao
    Wei Liang
    Nonlinear Dynamics, 2015, 80 : 1209 - 1220
  • [7] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Khan, Muhammad Khurram
    Liao, Junguo
    Liang, Wei
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1209 - 1220
  • [8] Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [9] An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
    Lu, Yanrong
    Li, Lixiang
    Zhang, Hao
    Yang, Yixian
    PLOS ONE, 2016, 11 (04):
  • [10] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96