Abstract
Recently, chaos has been treated as a good way to reduce computational complexity while satisfying security requirements of a key agreement protocol. Guo and Zhang (Inf Sci 180(20):4069–4074, 2010) proposed an chaotic public-key cryptosystem-based key agreement protocol. Lee (Inf Sci 290:63–71, 2015) has proved that Guo et al.’s scheme cannot resist off-line password guess attack. In this paper, we furtherly demonstrate Guo et al.’s scheme has redundancy in protocol design and still has some security flaws. Furthermore, we present an improved secure password and chaos-based two-party key agreement protocol, which can solve the security threats of replay and denial-of-service attacks. Meanwhile, we simplify the protocol steps to reduce redundancy in protocol design. From security and performance analysis, our proposed protocol can resist the security flaws in related works, and it has less communication overhead and computational complexity.
Similar content being viewed by others
Notes
Here, “\(A{\rightarrow }B{:}\{C\}\)” represents a transmission process, that A transmits a message C to B.
References
Amin, M., Faragallah, O.S., El-Latif, A.A.A.: Chaos-based hash function (CBHF) for cryptographic applications. Chaos Solitons Fractals 42(2), 767–772 (2009)
Baptista, M.: Cryptography with chaos. Phys. Lett. A 240(1–2), 50–54 (1998)
Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52(7), 1382–1393 (2005)
Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II Express Briefs 58(2), 110–114 (2011)
Chen, T.H., Wang, B.J., Tu, T.Y., Wang, C.H.: A security-enhanced key agreement protocol based on chaotic maps. Secur. Commun. Netw. 6(1), 108–114 (2013)
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)
Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 12(48), 1498–1509 (2001)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180(20), 4069–4074 (2010)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77(4), 1427–1439 (2014)
Lee, C.C., Li, C.T., Chiu, S.T., Lai, Y.M.: A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4), 2485–2495 (2014)
Lee, T.F.: Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 290, 63–71 (2015)
Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1), 23–30 (2007)
Özkaynak, F.: Cryptographically secure random number generator with chaotic additional input. Nonlinear Dyn. 78(3), 2015–2020 (2014)
Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of IEEE international conference on communications (ICC09), pp. 1–6. IEEE (2009)
Wang, Xy, Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)
Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24(1), 65–71 (2005)
Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)
Xiao, D., Shih, F.Y., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)
Xu, S.J., Chen, X.B., Zhang, R., Yang, Y.X., Guo, Y.C.: An improved chaotic cryptosystem based on circular bit shift and XOR operations. Phys. Lett. A 376(10), 1003–1010 (2012)
Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)
Acknowledgments
The authors sincerely thank the anonymous reviewers for their valuable comments that have led to the present improved version of the original manuscript. Meanwhile, the authors would like to thank Prof. Peilin Hong for helpful discussions and valuable suggestions during the whole writing process of the paper. This work is supported by the National Natural Science Foundation of China under Grant No. 61379129 and Youth Innovation Promotion Association CAS.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, Y., Xue, K. An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84, 549–557 (2016). https://doi.org/10.1007/s11071-015-2506-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-015-2506-2