DocumentCode :
2880787
Title :
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
Author :
Tseng, Huei-Ru ; Jan, Rong-Hong ; Yang, Wuu
Author_Institution :
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
fYear :
2009
fDate :
14-18 June 2009
Firstpage :
1
Lastpage :
6
Abstract :
A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that both of them agree on the established session keys for use in subsequent communications. Recently, several key agreement protocols based on chaotic maps are proposed. These protocols require a verification table to verify the legitimacy of a user. Since this approach clearly incurs the risk of tampering and the cost of managing the table and suffers from the stolen-verifier attack, we propose a novel key agreement protocol based on chaotic maps to enhance the security. The proposed protocol not only achieves mutual authentication without verification tables, but also allows users to anonymously interact with the server. Moreover, security of the proposed protocol is modelled and analyzed with Petri nets. Our analysis shows that the proposed protocol can successfully defend replay attacks, forgery attacks, and stolen-verifier attacks.
Keywords :
Petri nets; cryptographic protocols; telecommunication security; Petri nets; chaotic maps-based key agreement protocol; forgery attacks; mutual authentication; open communication network; stolen-verifier attack; user anonymity; Authentication; Chaos; Chaotic communication; Chebyshev approximation; Communication networks; Costs; Cryptography; Forgery; Petri nets; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, 2009. ICC '09. IEEE International Conference on
Conference_Location :
Dresden
ISSN :
1938-1883
Print_ISBN :
978-1-4244-3435-0
Electronic_ISBN :
1938-1883
Type :
conf
DOI :
10.1109/ICC.2009.5198581
Filename :
5198581
Link To Document :
بازگشت