Abstract
Three-party key agreement protocol is an important cryptographic mechanism for secure communication, which allows two parties authenticate each other with the help of a trusted server. Very recently, Lai et al.’s proposed a novel three-party key agreement protocol using the enhanced Chebyshev chaotic map and claimed their protocol could withstand various attacks. Unfortunately, in this paper, we will show their protocol is vulnerable to the privileged insider attack and the off-line password guessing attack. To solve the problems, we propose an improved three-party key agreement protocol using the enhanced Chebyshev chaotic map. Security analysis and performance analysis show our protocol not only could withstand various attacks, but also has similar performance. Therefore, it is very suitable for practical applications.
Similar content being viewed by others
References
Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615–621 (2010)
Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587–597 (2011)
Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103–108 (2011)
Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089–3099 (2009)
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571–579 (2007)
Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254–2261 (2010)
Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)
Smart, N.: An identity based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 38(13), 630–632 (2002)
Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weyl pairing. Electron. Lett. 39(8), 653–654 (2003)
He, D., Chen, Y., Chen, J., Zhang, R.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)
Ni, L., Chen, G., Li, J.: Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng. 37(2), 205–217 (2011)
He, D., Chen, J., Hu, J.: An authentication key agreement protocol using isogenies between elliptic curves. Int. J. Comput. Commun. Control 6(2), 251–258 (2011)
He, D., Padhye, S., Chen, J.: An efficient two-party certificateless authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)
He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221–230 (2012)
Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764–768 (2008)
Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE Int. Conf. Commun., ICC’09, Dresden, Germany, pp. 1–6 (2009)
Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 1986–1992 (2011)
Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2735–2740 (2012)
Xue, K.P., Hong, P.L.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969–2977 (2012)
Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72, 311–320 (2012)
Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149–1157 (2012)
Lai, H., Xiao, J., Li, L., Yang, Y.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. (2012). doi:10.1155/2012/454823
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37, 669–674 (2008)
He, D., Wu, S., Chen, J.: Note on ‘Design of improved password authentication and update scheme based on elliptic curve cryptography’. Math. Comput. Model. 55(3–4), 1661–1664 (2012)
Acknowledgements
The authors thank Professor Ali H. Nayfeh and the anonymous reviewers for their valuable comments. This research was supported in part by National Science foundation of China (No. 61201180), Beijing Natural Science Foundation (No. 4132055), and Excellent Young Scholars Research Fund of Beijing Institute of Technology.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhao, F., Gong, P., Li, S. et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn 74, 419–427 (2013). https://doi.org/10.1007/s11071-013-0979-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-013-0979-4