Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
Access Status
Authors
Date
2009Type
Metadata
Show full item recordCitation
Source Title
ISSN
Faculty
School
Remarks
The link to the journal’s home page is: http://www.elsevier.com/wps/find/journaldescription.cws_home/967/description#description. Copyright © 2009 Elsevier B.V. All rights reserved
Collection
Abstract
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From cryptographic point of view, their key exchange protocol is a key agreement protocol. Klein et al. claimed that their key agreement can be carried out over a public channel. In order to increase the key space and decrease the precision of the calculation, they made an extension of the system to anetwork of N Lorenz equations. In this paper, we will provide a cryptanalysis of their key agreement protocol. We will first point out some weaknesses, and then show that their protocol is not secure against several attacks including impersonation attack.
Related items
Showing items related by title, author, creator and subject.
-
Rathnayaka, Dinusha; Potdar, Vidyasagar (2011)The transport protocols for Wireless Sensor Network (WSN) play vital role in achieving the high performance together with longevity of the network. The researchers are continuously contributing in developing new transport ...
-
Aldosari, S.; Jansen, S.; Sun, Zhonghua (2018)Background: Three-dimensional (3D) printing has been shown to accurately replicate anatomical structures and pathologies in complex cardiovascular disease. Application of 3D printed models to simulate pulmonary arteries ...
-
Chin, Kwan-Wu (2000)Telecommunication service providers have recently begun to offer ubiquitous access to packetised data. As a result, the Internet is not limited to computers that are physically connected but is also available to users ...