Title :
Cryptanalysis of the chaotic-based key agreement protocols
Author :
Guo, Xianfeng ; Zhang, Jiashu
Author_Institution :
Sichuan Key Lab. of Signal & Inf. Process., Southwest Jiaotong Univ., Chengdu
Abstract :
Recently, Han-Chang showed that Xiao-Liao-Deng´s key agreement protocol based on chaotic maps is vulnerable to man-in-the-middle attack and proposed two improved schemes. One works in clock synchronization, and the other can work without synchronization. They claimed that their schemes are secure against replaying attacks and can establish a shared session key. However, we point out that all the aforementioned schemes are Non-contributory, i.e. the malicious party can predetermine the shared session key by the vice of several Chebyshev polynomials passing through the same point. In particular, we demonstrate that the asynchronous key agreement protocol can´t resist replaying attack. Therefore, the use of these schemes for secure applications may be discouraged.
Keywords :
Chebyshev approximation; cryptographic protocols; Chebyshev polynomials; clock synchronization; contributory nature; cryptanalysis; key agreement protocols; Authentication; Chaos; Chaotic communication; Chebyshev approximation; Clocks; Polynomials; Protocols; Public key cryptography; Resists; Synchronization; Chaos; Chebyshev; Contributory nature; Key agreement; Semi-group Property;
Conference_Titel :
Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on
Conference_Location :
Islamabad
Print_ISBN :
978-1-4244-2427-6
DOI :
10.1109/ISBAST.2008.4547651