Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards

被引:10
|
作者
Yau, Wei-Chuen [1 ]
Phan, Raphael C. -W. [1 ]
机构
[1] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
关键词
Authentication; Chebyshev polynomials; Chaotic maps; Security; EXCHANGE PROTOCOL; SECURITY; SCHEME; IMPROVEMENT; ROBUST; ATTACK;
D O I
10.1007/s11071-014-1704-7
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow communication parties to exchange session keys in an authentic and secure manner. Guo and Chang recently proposed a novel password-authenticated key agreement protocol using smart card based on chaotic maps. They claimed that the protocol achieves the security goal of mutual authentication, as well as other essential security requirements. In this paper, we show that this protocol is susceptible to key-compromise impersonation and parallel session attacks. We also identify two weaknesses in the password change phase of the protocol that leads to authentication with old password and denial of service, respectively.
引用
收藏
页码:809 / 821
页数:13
相关论文
共 50 条
  • [1] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Wei-Chuen Yau
    Raphael C.-W. Phan
    [J]. Nonlinear Dynamics, 2015, 79 : 809 - 821
  • [2] Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards
    Zhang, Liping
    Tang, Shanyu
    Cai, Zhihua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2405 - 2411
  • [3] Chaotic maps-based password-authenticated key agreement using smart cards
    Guo, Cheng
    Chang, Chin-Chen
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) : 1433 - 1440
  • [4] Comments on Chaotic Maps-based Password-authenticated Key Agreement Using Smart Cards
    Chang, Ya-Fen
    Tai, Wei-Liang
    Wu, Wei-Na
    Li, Wei-Han
    Chen, Yung-Chi
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 94 - 97
  • [5] Improved chaotic maps-based password-authenticated key agreement using smart cards
    Lin, Han-Yu
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) : 482 - 488
  • [6] Robust and efficient password-authenticated key agreement using smart cards
    Juang, Wen-Shenq
    Chen, Sian-Teng
    Liaw, Horng-Twu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) : 2551 - 2556
  • [7] An Enhanced Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    Kuol, Wen-Chung
    Chain, Kai
    Cheng, Jiin-Chiou
    Yang, Jar-Ferr
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 127 - 132
  • [8] Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    Li, Xiangxue
    Qiu, Weidong
    Zheng, Dong
    Chen, Kefei
    Li, Jianhua
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (02) : 793 - 800
  • [9] Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards
    Ku, WC
    Chuang, HM
    Chiang, MH
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (11) : 3235 - 3238
  • [10] A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card
    Tsai, Jia-Lun
    Lo, Nai-Wei
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (13) : 1955 - 1963