Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Security of a key agreement protocol based on chaotic maps

    116288_9897_PUB-CBS-EEB-MC-46229.pdf (373.8Kb)
    Access Status
    Open access
    Authors
    Han, Song
    Date
    2008
    Type
    Journal Article
    
    Metadata
    Show full item record
    Citation
    Han, Song. 2008. Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals 38: pp. 764-768.
    Source Title
    Chaos, Solitons and Fractals
    DOI
    10.1016/j.chaos.2007.01.017
    ISSN
    09600779
    Faculty
    Curtin Business School
    Centre for Extended Enterprises and Business Intelligence
    Remarks

    The link to the journal’s home page is: http://www.elsevier.com/wps/find/journaldescription.cws_home/967/description#description

    Copyright © 2008 Elsevier B.V. All rights reserved

    URI
    http://hdl.handle.net/20.500.11937/40506
    Collection
    • Curtin Research Publications
    Abstract

    Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.?s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server?s communications.

    Related items

    Showing items related by title, author, creator and subject.

    • Chaotic map based key agreement with/out clock synchronization
      Han, Song; Chang, Elizabeth (2007)
      In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on ...
    • Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization
      Han, Song; Chang, Elizabeth; Dillon, Tharam S; Hwang, M.; Lee, C. (2009)
      Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which ...
    • Detecting wormhole and Byzantine attacks in mobile ad hoc networks
      Alam, Mohammad Rafiqul (2011)
      The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.