Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol

被引:13
|
作者
Hu, Xuexian [1 ,2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Chaotic maps; Key exchange protocol; Anonymity; Man-in-the-middle attack;
D O I
10.1007/s11071-014-1515-x
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Recently, Lee et al. (Nonlinear Dyn, 73(1-2):125-132, 2013) proposed a three party password authenticated key exchange with user anonymity by utilizing extended chaotic maps. They claimed that their protocol is more secure than previously proposed schemes. In this paper, our analysis shows that Lee et al.'s protocol suffers from two kinds of attacks: (1) man-in-the-middle attack, and (2) user anonymity attack. To overcome these weakness, we propose an enhanced protocol that can resist the attacks described and yet with comparable efficiency.
引用
收藏
页码:1293 / 1300
页数:8
相关论文
共 50 条
  • [21] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    NONLINEAR DYNAMICS, 2014, 77 (1-2) : 399 - 411
  • [22] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    Nonlinear Dynamics, 2014, 77 : 399 - 411
  • [23] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [24] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [25] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [26] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [27] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [28] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409
  • [29] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [30] Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings
    Wei, Fushan
    Ma, Chuangui
    Cheng, Qingfeng
    INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 135 - 142