Skip to main content
Log in

Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Three-party key agreement protocol is an important cryptographic mechanism for secure communication, which allows two parties authenticate each other with the help of a trusted server. Very recently, Lai et al.’s proposed a novel three-party key agreement protocol using the enhanced Chebyshev chaotic map and claimed their protocol could withstand various attacks. Unfortunately, in this paper, we will show their protocol is vulnerable to the privileged insider attack and the off-line password guessing attack. To solve the problems, we propose an improved three-party key agreement protocol using the enhanced Chebyshev chaotic map. Security analysis and performance analysis show our protocol not only could withstand various attacks, but also has similar performance. Therefore, it is very suitable for practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  2. Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615–621 (2010)

    Article  MATH  Google Scholar 

  3. Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587–597 (2011)

    Article  Google Scholar 

  4. Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103–108 (2011)

    Article  MATH  Google Scholar 

  5. Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571–579 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  7. Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  8. Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  9. Smart, N.: An identity based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 38(13), 630–632 (2002)

    Article  MATH  Google Scholar 

  10. Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 39(8), 653–654 (2003)

    Article  Google Scholar 

  11. He, D., Chen, Y., Chen, J., Zhang, R.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ni, L., Chen, G., Li, J.: Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng. 37(2), 205–217 (2011)

    Article  MATH  Google Scholar 

  13. He, D., Chen, J., Hu, J.: An authentication key agreement protocol using isogenies between elliptic curves. Int. J. Comput. Commun. Control 6(2), 251–258 (2011)

    MathSciNet  Google Scholar 

  14. He, D., Padhye, S., Chen, J.: An efficient two-party certificateless authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  15. He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221–230 (2012)

    Article  Google Scholar 

  16. Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  17. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764–768 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE Int. Conf. Commun., ICC’09, Dresden, Germany, pp. 1–6 (2009)

    Chapter  Google Scholar 

  19. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 1986–1992 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  20. Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2735–2740 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  21. Xue, K.P., Hong, P.L.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969–2977 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  22. Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72, 311–320 (2012)

    Article  Google Scholar 

  23. Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  24. He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149–1157 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  25. Lai, H., Xiao, J., Li, L., Yang, Y.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. (2012). doi:10.1155/2012/454823

    MathSciNet  Google Scholar 

  26. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37, 669–674 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  27. He, D., Wu, S., Chen, J.: Note on ‘Design of improved password authentication and update scheme based on elliptic curve cryptography’. Math. Comput. Model. 55(3–4), 1661–1664 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors thank Professor Ali H. Nayfeh and the anonymous reviewers for their valuable comments. This research was supported in part by National Science foundation of China (No. 61201180), Beijing Natural Science Foundation (No. 4132055), and Excellent Young Scholars Research Fund of Beijing Institute of Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Gong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhao, F., Gong, P., Li, S. et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn 74, 419–427 (2013). https://doi.org/10.1007/s11071-013-0979-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-013-0979-4

Keywords

Navigation