Skip to main content
Log in

A secure chaotic maps-based key agreement protocol without using smart cards

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

To guarantee secure communication, many maps-based key agreement protocols have been proposed. Due to inherent tamper-resistance, most of them are based on smart cards. Unfortunately, the cost of cards and readers makes these protocols costly. In the real world, common storage devices, such as universal serial bus (USB) thumb drives, portable HDDs, mobile phones, and laptop or desktop PCs, are widely used, and they are much cheaper or more convenient for storing user authentication information. These devices do not provide tamper-resistance; it is a challenge to design a secure authentication protocol using these kinds of memory devices. In this paper, we will propose a maps-based key agreement protocol without using smart cards. According to our analysis, the proposed protocol guarantees mutual authentication, and also resists different attacks. Therefore, our protocol is suitable even for practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Liu, B., Peng, J.: Nonlinear Dynamics. High Education Press, Beijing (2004)

    Google Scholar 

  2. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615–621 (2010)

    Article  MATH  Google Scholar 

  4. Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587–597 (2011)

    Article  Google Scholar 

  5. Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103–108 (2011)

    Article  MATH  Google Scholar 

  6. Wong, K., Kwok, B., Law, W.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)

    Article  MATH  Google Scholar 

  7. Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571–579 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  9. Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  10. Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 1338–1347 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  11. Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals 24, 65–71 (2005)

    MathSciNet  MATH  Google Scholar 

  12. Kocarev, L., Tasev, Z.: Public key encryption based on Chebyshev maps. In: Proceedings of the 2003 IEEE Symposium on Circuits and Systems, pp. 28–31 (2003)

    Google Scholar 

  13. Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. Chaos Solitons Fractals 26, 7–11 (2005)

    Article  MATH  Google Scholar 

  14. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177, 136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  15. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764–768 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  16. Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39, 1283–1289 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  17. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177, 136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  18. Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178, 1598–11602 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  19. Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180, 4069–4074 (2010)

    Article  MATH  Google Scholar 

  20. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC’09, Germany, pp. 1–6 (2009)

    Chapter  Google Scholar 

  21. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  22. Yoon, E.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  23. Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  Google Scholar 

  24. He, D., Chen, Y., Chen, Y.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MathSciNet  Google Scholar 

  25. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  26. Chen, T., Wang, B., Tu, T., Wang, C.: A security-enhanced key agreement protocol based on chaotic maps. Security Comm. Networks (2012). doi:10.1002/sec.537

    Google Scholar 

  27. He, D.: Cryptanalysis of a key agreement protocol based on chaotic Hash, http://eprint.iacr.org/2011/333.pdf (2012). Accessed 26 June 2012

  28. Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I, Regul. Pap. 52, 1382–1393 (2005)

    Article  MathSciNet  Google Scholar 

  29. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669–674 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  30. Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Proceedings of Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, pp. 30–45 (1997)

    Google Scholar 

  31. Boyd, C., Mathuria, A.: Protocol for Authentication and Key Establishment. Springer, Berlin (2003)

    Google Scholar 

Download references

Acknowledgements

The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by National Natural Science Foundation of China (Nos. 61201180, 61202447).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gong, P., Li, P. & Shi, W. A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn 70, 2401–2406 (2012). https://doi.org/10.1007/s11071-012-0628-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-012-0628-3

Keywords

Navigation