Security of a key agreement protocol based on chaotic maps
Access Status
Authors
Date
2008Type
Metadata
Show full item recordCitation
Source Title
ISSN
Faculty
Remarks
The link to the journal’s home page is: http://www.elsevier.com/wps/find/journaldescription.cws_home/967/description#description
Copyright © 2008 Elsevier B.V. All rights reserved
Collection
Abstract
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.?s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server?s communications.
Related items
Showing items related by title, author, creator and subject.
-
Han, Song; Chang, Elizabeth (2007)In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on ...
-
Han, Song; Chang, Elizabeth; Dillon, Tharam S; Hwang, M.; Lee, C. (2009)Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which ...
-
Alam, Mohammad Rafiqul (2011)The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also ...