Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 15))

Included in the following conference series:

Abstract

In 2008, Han et al. proposed two key agreement protocols based on chaotic maps; timestamp based protocol and nonce based protocol. The current paper, however, demonstrates the vulnerability of Han et al.’s nonce based key agreement protocol to replay attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocarev, L., Tasev, Z.: Public-key Encryption based on Chebysheve Maps. In: Proc. IEEE Symp. Circuits Syst. (ISCAS 2003), vol. 3, pp. 28–31 (2003)

    Google Scholar 

  2. Rivlin, T.J.: Chebysheve Polynomials. John Wiley and Sons, Inc., New York (1990)

    Google Scholar 

  3. Xiao, D., Liao, X.F., Wong, K.: An Efficient Entire Chaos-based Scheme for Deniable Authentication. Chaos, Solitons & Fractals 23(4), 1327–1331 (2005)

    MATH  Google Scholar 

  4. Xiao, D., Liao, X.F., Deng, S.J.: A Novel Key Agreement Protocol based on Chaotic Maps. Inform. Sci. 177, 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  5. Bergamo, P., D’Arco, P., Santis, A., Kocarev, L.: Security of Public Key Cryptosystems based on Chebyshev Polynomials. IEEE Trans. Circ. Syst.-I 52(7), 1382–1393 (2005)

    Article  Google Scholar 

  6. Han, S.: Security of a Key Agreement Protocol based on Chaotic Maps. Chaos, Solitons & Fractals 38(3), 764–768 (2008)

    Article  MathSciNet  Google Scholar 

  7. Chang, E., Han, S.: Using Passphrase to Construct Key Agreement. CBS-IS-, Technical Report, Curtin University of Technology (2006)

    Google Scholar 

  8. Han, S., Chang, E.: Chaotic Map based Key Agreement With/out Clock Synchronization, Chaos, Solitons & Fractals,doi:10.1016/j.chaos.2007.06.030 (in press, 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Donald C. Wunsch II Daniel S. Levine Kang-Hyun Jo

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Yoo, KY. (2008). Replay Attacks on Han et al.’s Chaotic Map Based Key Agreement Protocol Using Nonce. In: Huang, DS., Wunsch, D.C., Levine, D.S., Jo, KH. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques. ICIC 2008. Communications in Computer and Information Science, vol 15. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85930-7_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85930-7_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85929-1

  • Online ISBN: 978-3-540-85930-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics