Security of a key agreement protocol based on chaotic maps
dc.contributor.author | Han, Song | |
dc.date.accessioned | 2017-01-30T14:43:30Z | |
dc.date.available | 2017-01-30T14:43:30Z | |
dc.date.created | 2009-02-22T18:01:46Z | |
dc.date.issued | 2008 | |
dc.identifier.citation | Han, Song. 2008. Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals 38: pp. 764-768. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/40506 | |
dc.identifier.doi | 10.1016/j.chaos.2007.01.017 | |
dc.description.abstract |
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev?s encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.?s system. In order to address Bergamo et al.? attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.?s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server?s communications. | |
dc.publisher | Elsevier | |
dc.title | Security of a key agreement protocol based on chaotic maps | |
dc.type | Journal Article | |
dcterms.source.volume | 38 | |
dcterms.source.startPage | 764 | |
dcterms.source.endPage | 768 | |
dcterms.source.issn | 09600779 | |
dcterms.source.title | Chaos, Solitons and Fractals | |
curtin.note |
The link to the journal’s home page is: | |
curtin.note |
Copyright © 2008 Elsevier B.V. All rights reserved | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | Centre for Extended Enterprises and Business Intelligence |