Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps

Chien-Ming Chen,
Linlin Xu,
King-Hang Wang,
Shuai Liu,
Tsu-Yang Wu,

Abstract


Chaotic map has been receiving more and more attention in the cryptographic literature. In recent years, there are some scholars working on a particular type of authenticated key exchange protocol using chaotic map. Some of them identified a vulnerability of their precedences and presented their patching protocols. In this paper, we also identify a vulnerability in some of these authenticated key exchange protocols. We first redesign a protocol and optimize it in computation efficiency. Then we present the security analysis by a logic proof based on BAN logic.


Citation Format:
Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, Tsu-Yang Wu, "Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps," Journal of Internet Technology, vol. 19, no. 3 , pp. 679-687, May. 2018.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com