DocumentCode :
1919146
Title :
Cryptanalysis of the chaotic-based key agreement protocols
Author :
Guo, Xianfeng ; Zhang, Jiashu
Author_Institution :
Sichuan Key Lab. of Signal & Inf. Process., Southwest Jiaotong Univ., Chengdu
fYear :
2008
fDate :
23-24 April 2008
Firstpage :
1
Lastpage :
3
Abstract :
Recently, Han-Chang showed that Xiao-Liao-Deng´s key agreement protocol based on chaotic maps is vulnerable to man-in-the-middle attack and proposed two improved schemes. One works in clock synchronization, and the other can work without synchronization. They claimed that their schemes are secure against replaying attacks and can establish a shared session key. However, we point out that all the aforementioned schemes are Non-contributory, i.e. the malicious party can predetermine the shared session key by the vice of several Chebyshev polynomials passing through the same point. In particular, we demonstrate that the asynchronous key agreement protocol can´t resist replaying attack. Therefore, the use of these schemes for secure applications may be discouraged.
Keywords :
Chebyshev approximation; cryptographic protocols; Chebyshev polynomials; clock synchronization; contributory nature; cryptanalysis; key agreement protocols; Authentication; Chaos; Chaotic communication; Chebyshev approximation; Clocks; Polynomials; Protocols; Public key cryptography; Resists; Synchronization; Chaos; Chebyshev; Contributory nature; Key agreement; Semi-group Property;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on
Conference_Location :
Islamabad
Print_ISBN :
978-1-4244-2427-6
Type :
conf
DOI :
10.1109/ISBAST.2008.4547651
Filename :
4547651
Link To Document :
بازگشت