IDEAS home Printed from https://ideas.repec.org/a/eee/chsofr/v39y2009i3p1283-1289.html
   My bibliography  Save this article

Chaotic map based key agreement with/out clock synchronization

Author

Listed:
  • Han, S.
  • Chang, E.

Abstract

In order to address Bergamo et al.’s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.’s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.

Suggested Citation

  • Han, S. & Chang, E., 2009. "Chaotic map based key agreement with/out clock synchronization," Chaos, Solitons & Fractals, Elsevier, vol. 39(3), pages 1283-1289.
  • Handle: RePEc:eee:chsofr:v:39:y:2009:i:3:p:1283-1289
    DOI: 10.1016/j.chaos.2007.06.030
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0960077907004134
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.chaos.2007.06.030?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Alvarez, Gonzalo, 2005. "Security problems with a chaos-based deniable authentication scheme," Chaos, Solitons & Fractals, Elsevier, vol. 26(1), pages 7-11.
    2. Zhang, Bai & Chen, Maoyin & Zhou, Donghua, 2006. "Chaotic secure communication based on particle filtering," Chaos, Solitons & Fractals, Elsevier, vol. 30(5), pages 1273-1280.
    3. Han, Song, 2008. "Security of a key agreement protocol based on chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 38(3), pages 764-768.
    4. Behnia, S. & Akhshani, A. & Mahmodi, H. & Akhavan, A., 2008. "A novel algorithm for image encryption based on mixture of chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 35(2), pages 408-419.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Akhshani, A. & Behnia, S. & Akhavan, A. & Jafarizadeh, M.A. & Abu Hassan, H. & Hassan, Z., 2009. "Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2405-2412.
    2. Chandrashekhar Meshram & Cheng-Chi Lee & Ismail Bahkali & Agbotiname Lucky Imoize, 2023. "An Efficient Fractional Chebyshev Chaotic Map-Based Three-Factor Session Initiation Protocol for the Human-Centered IoT Architecture," Mathematics, MDPI, vol. 11(9), pages 1-20, April.
    3. Han, S. & Chang, E. & Dillon, T. & Hwang, M. & Lee, C., 2009. "Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization," Chaos, Solitons & Fractals, Elsevier, vol. 40(5), pages 2569-2575.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Akhavan, A. & Samsudin, A. & Akhshani, A., 2009. "Hash function based on piecewise nonlinear chaotic map," Chaos, Solitons & Fractals, Elsevier, vol. 42(2), pages 1046-1053.
    2. Han, S. & Chang, E. & Dillon, T. & Hwang, M. & Lee, C., 2009. "Identifying attributes and insecurity of a public-channel key exchange protocol using chaos synchronization," Chaos, Solitons & Fractals, Elsevier, vol. 40(5), pages 2569-2575.
    3. Behnia, S. & Akhshani, A. & Akhavan, A. & Mahmodi, H., 2009. "Applications of tripled chaotic maps in cryptography," Chaos, Solitons & Fractals, Elsevier, vol. 40(1), pages 505-519.
    4. Gao, Tiegang & Gu, Qiaolun & Emmanuel, Sabu, 2009. "A novel image authentication scheme based on hyper-chaotic cell neural network," Chaos, Solitons & Fractals, Elsevier, vol. 42(1), pages 548-553.
    5. Mazloom, Sahar & Eftekhari-Moghadam, Amir Masud, 2009. "Color image encryption based on Coupled Nonlinear Chaotic Map," Chaos, Solitons & Fractals, Elsevier, vol. 42(3), pages 1745-1754.
    6. Akhshani, A. & Behnia, S. & Akhavan, A. & Jafarizadeh, M.A. & Abu Hassan, H. & Hassan, Z., 2009. "Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2405-2412.
    7. Aguilar-Bustos, A.Y. & Cruz-Hernández, C., 2009. "Synchronization of discrete-time hyperchaotic systems: An application in communications," Chaos, Solitons & Fractals, Elsevier, vol. 41(3), pages 1301-1310.
    8. Wong, Kwok-Wo & Kwok, Bernie Sin-Hung & Yuen, Ching-Hung, 2009. "An efficient diffusion approach for chaos-based image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 41(5), pages 2652-2663.
    9. YuYan Bian & WenXin Yu, 2021. "A secure communication method based on 6-D hyperchaos and circuit implementation," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 77(4), pages 731-751, August.
    10. Rhouma, Rhouma & Meherzi, Soumaya & Belghith, Safya, 2009. "OCML-based colour image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 40(1), pages 309-318.
    11. Smaoui, Nejib & Kanso, Ali, 2009. "Cryptography with chaos and shadowing," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2312-2321.
    12. Rech, Paulo C., 2009. "A coupling of three quadratic maps," Chaos, Solitons & Fractals, Elsevier, vol. 41(4), pages 1949-1952.
    13. Han, Song, 2008. "Security of a key agreement protocol based on chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 38(3), pages 764-768.
    14. Bowen Zhang & Lingfeng Liu, 2023. "Chaos-Based Image Encryption: Review, Application, and Challenges," Mathematics, MDPI, vol. 11(11), pages 1-39, June.
    15. Moreira Bezerra, João Inácio & Valduga de Almeida Camargo, Vinícius & Molter, Alexandre, 2021. "A new efficient permutation-diffusion encryption algorithm based on a chaotic map," Chaos, Solitons & Fractals, Elsevier, vol. 151(C).
    16. Wang, Yong & Wong, Kwok-Wo & Liao, Xiaofeng & Xiang, Tao & Chen, Guanrong, 2009. "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, Elsevier, vol. 41(4), pages 1773-1783.
    17. Wu, Guo-Cheng & Baleanu, Dumitru & Xie, He-Ping & Chen, Fu-Lai, 2016. "Chaos synchronization of fractional chaotic maps based on the stability condition," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 460(C), pages 374-383.
    18. He, Yao-Yao & Zhou, Jian-Zhong & Xiang, Xiu-Qiao & Chen, Heng & Qin, Hui, 2009. "Comparison of different chaotic maps in particle swarm optimization algorithm for long-term cascaded hydroelectric system scheduling," Chaos, Solitons & Fractals, Elsevier, vol. 42(5), pages 3169-3176.
    19. Xiang, Tao & Wong, Kwok-Wo & Liao, Xiaofeng, 2009. "On the security of a novel key agreement protocol based on chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 40(2), pages 672-675.
    20. Nosrati, Komeil & Shafiee, Masoud, 2018. "Fractional-order singular logistic map: Stability, bifurcation and chaos analysis," Chaos, Solitons & Fractals, Elsevier, vol. 115(C), pages 224-238.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:39:y:2009:i:3:p:1283-1289. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.