Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization

    Access Status
    Fulltext not available
    Authors
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam S
    Hwang, M.
    Lee, C.
    Date
    2009
    Type
    Journal Article
    
    Metadata
    Show full item record
    Citation
    Han, S. and Chang, E. and Dillon, T. and Hwang, M. and Lee, C. 2009. Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization. Chaos, Solitons and Fractals. 40 (5): pp. 2569-2575.
    Source Title
    Chaos, Solitons and Fractals
    DOI
    10.1016/j.chaos.2007.10.050
    ISSN
    09600779
    Faculty
    Curtin Business School
    The Digital Ecosystems and Business Intelligence Institute (DEBII)
    School
    Digital Ecosystems and Business Intelligence Institute (DEBII)
    Remarks

    The link to the journal’s home page is: http://www.elsevier.com/wps/find/journaldescription.cws_home/967/description#description. Copyright © 2009 Elsevier B.V. All rights reserved

    URI
    http://hdl.handle.net/20.500.11937/19133
    Collection
    • Curtin Research Publications
    Abstract

    Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. From cryptographic point of view, their key exchange protocol is a key agreement protocol. Klein et al. claimed that their key agreement can be carried out over a public channel. In order to increase the key space and decrease the precision of the calculation, they made an extension of the system to anetwork of N Lorenz equations. In this paper, we will provide a cryptanalysis of their key agreement protocol. We will first point out some weaknesses, and then show that their protocol is not secure against several attacks including impersonation attack.

    Related items

    Showing items related by title, author, creator and subject.

    • Wireless Sensor Network transport protocol: A critical review
      Rathnayaka, Dinusha; Potdar, Vidyasagar (2011)
      The transport protocols for Wireless Sensor Network (WSN) play vital role in achieving the high performance together with longevity of the network. The researchers are continuously contributing in developing new transport ...
    • Optimization of computed tomography pulmonary angiography protocols using 3D printed model with simulation of pulmonary embolism
      Aldosari, S.; Jansen, S.; Sun, Zhonghua (2018)
      Background: Three-dimensional (3D) printing has been shown to accurately replicate anatomical structures and pathologies in complex cardiovascular disease. Application of 3D printed models to simulate pulmonary arteries ...
    • An investigation into the application of active networks to mobile computing environments
      Chin, Kwan-Wu (2000)
      Telecommunication service providers have recently begun to offer ubiquitous access to packetised data. As a result, the Internet is not limited to computers that are physically connected but is also available to users ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.