Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps ·
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
|作者||Chien-Ming Chen、Linlin Xu、King-Hang Wang、Shuai Liu、Tsu-Yang Wu|
Chaotic map has been receiving more and more attention in the cryptographic literature. In recent years, there are some scholars working on a particular type of authenticated key exchange protocol using chaotic map. Some of them identified a vulnerability of their precedences and presented their patching protocols. In this paper, we also identify a vulnerability in some of these authenticated key exchange protocols. We first redesign a protocol and optimize it in computation efficiency. Then we present the security analysis by a logic proof based on BAN logic.
|關鍵詞||Chaotic map、Cryptography、Authentication key exchange protocol|
|MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol|
|Fuzzy Decision Load-balancing Algorithm for Cloud-based Terminal Services|