Back to Search
Start Over
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Source :
- Nonlinear Dynamics. 69:1149-1157
- Publication Year :
- 2012
- Publisher :
- Springer Science and Business Media LLC, 2012.
-
Abstract
- Very recently, Lee et al. (C. Lee, C. Chen, C. Wu, S. Huang, An extended chaotic maps-based key agreement protocol with user anonymity, Nonlinear Dynamics, doi: 10.1007/s11071-011-0247-4 ) proposed a chaotic maps-based key agreement protocol with user anonymity and claimed their protocol could resist various attacks. In this paper, we will point out that Lee et al.’s protocol suffers from three weaknesses: (1) inability of resisting the privileged insider attack; (2) inability of resisting the denial-of-service attack; and (3) inability of providing anonymity. To overcome the weaknesses, we also proposed an improved protocol. The analysis shows our protocol is more suitable for practical applications.
- Subjects :
- Key-agreement protocol
Computer science
Applied Mathematics
Mechanical Engineering
Data_MISCELLANEOUS
Chaotic
Aerospace Engineering
Ocean Engineering
Mutual authentication
Computer security
computer.software_genre
law.invention
Control and Systems Engineering
law
Insider attack
Electrical and Electronic Engineering
Cryptanalysis
computer
Protocol (object-oriented programming)
Anonymity
Subjects
Details
- ISSN :
- 1573269X and 0924090X
- Volume :
- 69
- Database :
- OpenAIRE
- Journal :
- Nonlinear Dynamics
- Accession number :
- edsair.doi...........689458656923165de52154dc0fab0344