Skip to main content
Log in

Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, Gong et al. (Nonlinear Dyn, doi:10.1007/s11071-012-0628-3, 2012) proposed a chaotic map-based key agreement protocol without using smart cards. They claimed that the protocol is secure against password-guessing attacks. However, we show that Gong et al.’s protocol is vulnerable to partition attacks, whereby the adversary can guess the correct password off-line. We also demonstrate that the protocol suffers from a a stolen-verifier attack along with password change pitfalls. Thereafter, we proposed an chaotic map-based key agreement protocol without using smart cards to conquer the mentioned weaknesses. The security analysis of the proposed protocol shows that it is suitable for the applications with higher security requirement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Boyd, C., Mathuria, A.: Protocol for Authentication and Key Establishment. Springer, Berlin (2003)

    Book  Google Scholar 

  2. Farash, M.S., Bayat, M., Attari, M.A.: Vulnerability of two multiple-key agreement protocols. Comput. Electr. Eng. 37(2), 199–204 (2011)

    Article  MATH  Google Scholar 

  3. Farash, M.S., Attari, M.A., Bayat, M.: A certificateless multiple-key agreement protocol without one-way Hash functions based on bilinear pairings. IACSIT Int. J. Eng. Technol. 4(3), 321–325 (2012)

    Article  Google Scholar 

  4. Farash, M.S., Attari, M.A., Atani, R.E., Jami, M.: A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput. Electr. Eng. 39(2), 530–541 (2013)

    Article  Google Scholar 

  5. Farash, M.S., Attari, M.A.: A pairing-free ID-based key agreement protocol with different PKGs. Int. J. Netw. Secur. 16(2), 143–148 (2014)

    Google Scholar 

  6. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman and Hall/CRC, Boca Raton (2003)

    MATH  Google Scholar 

  7. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  8. Guan, Z.H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005)

    Article  MATH  Google Scholar 

  9. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366, 391–396 (2007)

    Article  Google Scholar 

  10. Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 394–400 (2008)

    Article  MATH  Google Scholar 

  11. Wong, K., Kwok, B., Law, W.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)

    Article  MATH  Google Scholar 

  12. Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615–621 (2010)

    Article  MATH  Google Scholar 

  13. Wang, X., Wang, X., Zhao, J., Zhang, Z.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63(4), 587–597 (2011)

    Article  MathSciNet  Google Scholar 

  14. Sheu, L.J.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  15. Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571–579 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  16. Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  17. Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeable parameter. Chaos Solitons Fractals 24, 65–71 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  18. Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  19. Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 1338–1347 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  20. Kocarev, L., Tasev, Z.: Public key encryption based on Chebyshev maps. In: Proceedings of the IEEE Symposium on Circuits and Systems, pp. 28–31 (2003).

  21. Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 52, 1382–1393 (2005)

    Article  MathSciNet  Google Scholar 

  22. Bose, R.: Novel public key encryption technique based on multiple chaotic systems. Phys. Rev. Lett. 95(9), 098702 (2005)

    Article  Google Scholar 

  23. Wang, K., Pei, W., Zhou, L., Cheung, Y., He, Z.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259–262 (2006)

    Google Scholar 

  24. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37, 669–674 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  25. Xiao, D., Liao, X., Wong, K.: An efficient entire chaos- based scheme for deniable authentication. Chaos Solitons Fractals 23(4), 1327–1331 (2005)

    Article  MATH  Google Scholar 

  26. Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. Chaos Solitons Fractals 26, 7–11 (2005)

    Article  MATH  Google Scholar 

  27. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177, 136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  28. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764–768 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  29. Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39, 1283–1289 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  30. Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178, 1598–11602 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  31. Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180, 4069–4074 (2010)

    Article  MATH  Google Scholar 

  32. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC’09, Germany, pp. 1–6 (2009).

  33. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  34. Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  35. Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  36. He, D., Chen, Y., Chen, Y.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  37. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  38. Chen, T., Wang, B., Tu, T., Wang, C.: A security-enhanced key agreement protocol based on chaotic maps. Secur. Commun. Netw. (2012). doi:10.1002/sec.537

  39. He, D., Khan, M.K.: Cryptanalysis of a key agreement protocol based on chaotic Hash. Int. J. Electron. Secur. Digit. Forensics 5(3/4), 172–177 (2013)

    Google Scholar 

  40. Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0628-3

  41. Li, Z., Cui, Y., Jin, Y., Xu, H.: Parameter Selection in Public Key Cryptosystem based on Chebyshev Polynomials over Finite Field. J. Commun. 6(5), 400–408 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Sabzinejad Farash.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Farash, M.S., Attari, M.A. Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dyn 76, 1203–1213 (2014). https://doi.org/10.1007/s11071-013-1204-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-013-1204-1

Keywords

Navigation