Skip to main content
Log in

An improved secure and efficient password and chaos-based two-party key agreement protocol

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, chaos has been treated as a good way to reduce computational complexity while satisfying security requirements of a key agreement protocol. Guo and Zhang (Inf Sci 180(20):4069–4074, 2010) proposed an chaotic public-key cryptosystem-based key agreement protocol. Lee (Inf Sci 290:63–71, 2015) has proved that Guo et al.’s scheme cannot resist off-line password guess attack. In this paper, we furtherly demonstrate Guo et al.’s scheme has redundancy in protocol design and still has some security flaws. Furthermore, we present an improved secure password and chaos-based two-party key agreement protocol, which can solve the security threats of replay and denial-of-service attacks. Meanwhile, we simplify the protocol steps to reduce redundancy in protocol design. From security and performance analysis, our proposed protocol can resist the security flaws in related works, and it has less communication overhead and computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. Here, “\(A{\rightarrow }B{:}\{C\}\)” represents a transmission process, that A transmits a message C to B.

References

  1. Amin, M., Faragallah, O.S., El-Latif, A.A.A.: Chaos-based hash function (CBHF) for cryptographic applications. Chaos Solitons Fractals 42(2), 767–772 (2009)

    Article  Google Scholar 

  2. Baptista, M.: Cryptography with chaos. Phys. Lett. A 240(1–2), 50–54 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I 52(7), 1382–1393 (2005)

  4. Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II Express Briefs 58(2), 110–114 (2011)

    Article  Google Scholar 

  5. Chen, T.H., Wang, B.J., Tu, T.Y., Wang, C.H.: A security-enhanced key agreement protocol based on chaotic maps. Secur. Commun. Netw. 6(1), 108–114 (2013)

  6. Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

    Article  Google Scholar 

  7. Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 12(48), 1498–1509 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  8. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  9. Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180(20), 4069–4074 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  10. Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)

    Article  Google Scholar 

  11. Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77(4), 1427–1439 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  12. Lee, C.C., Li, C.T., Chiu, S.T., Lai, Y.M.: A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4), 2485–2495 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  13. Lee, T.F.: Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 290, 63–71 (2015)

    Article  Google Scholar 

  14. Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1), 23–30 (2007)

    Article  MATH  Google Scholar 

  15. Özkaynak, F.: Cryptographically secure random number generator with chaotic additional input. Nonlinear Dyn. 78(3), 2015–2020 (2014)

    Article  Google Scholar 

  16. Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of IEEE international conference on communications (ICC09), pp. 1–6. IEEE (2009)

  17. Wang, Xy, Chen, F., Wang, T.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  18. Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24(1), 65–71 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  19. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)

  20. Xiao, D., Shih, F.Y., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)

  21. Xu, S.J., Chen, X.B., Zhang, R., Yang, Y.X., Guo, Y.C.: An improved chaotic cryptosystem based on circular bit shift and XOR operations. Phys. Lett. A 376(10), 1003–1010 (2012)

  22. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

The authors sincerely thank the anonymous reviewers for their valuable comments that have led to the present improved version of the original manuscript. Meanwhile, the authors would like to thank Prof. Peilin Hong for helpful discussions and valuable suggestions during the whole writing process of the paper. This work is supported by the National Natural Science Foundation of China under Grant No. 61379129 and Youth Innovation Promotion Association CAS.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaiping Xue.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Xue, K. An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84, 549–557 (2016). https://doi.org/10.1007/s11071-015-2506-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2506-2

Keywords

Navigation