A secure key agreement protocol based on chaotic maps

To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol ex...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Chinese physics B 2013-11, Vol.22 (11), p.239-243
1. Verfasser: 王兴元 栾大朋
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 243
container_issue 11
container_start_page 239
container_title Chinese physics B
container_volume 22
creator 王兴元 栾大朋
description To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.
doi_str_mv 10.1088/1674-1056/22/11/110503
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1762071414</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>47694142</cqvip_id><sourcerecordid>1762071414</sourcerecordid><originalsourceid>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</originalsourceid><addsrcrecordid>eNo9kMtqwzAQRUVpoWnaXyjqrhs3Gj0sZRlCXxDopl2LsSwnbm0rkZxF_r4KCYGB2dxzuRxCHoG9ADNmBqWWBTBVzjifAeRjiokrMuFMmUIYIa_J5BK6JXcp_TJWAuNiQtSCJu_20dM_f6C4jt73fhjpNoYxuNDRCpOvaRio22AYW0d73KZ7ctNgl_zD-U_Jz9vr9_KjWH29fy4Xq8IJkGMhGxTOQQUKNEqQUDW6UlCjYawyKDmfoy65qIUB4PO8F0StpAbkKHTlxZQ8n3rznN3ep9H2bXK-63DwYZ8sZJrpXCxztDxFXQwpRd_YbWx7jAcLzB492aMCe1RgObcA9uQpg09ncBOG9a4d1hdS6nKeu7n4B567Y_0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1762071414</pqid></control><display><type>article</type><title>A secure key agreement protocol based on chaotic maps</title><source>IOP Publishing Journals</source><creator>王兴元 栾大朋</creator><creatorcontrib>王兴元 栾大朋</creatorcontrib><description>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</description><identifier>ISSN: 1674-1056</identifier><identifier>EISSN: 2058-3834</identifier><identifier>EISSN: 1741-4199</identifier><identifier>DOI: 10.1088/1674-1056/22/11/110503</identifier><language>eng</language><subject>Chaos theory ; Computer information security ; Gongs ; Management ; Polynomials ; Protocols ; Security ; 公共通道 ; 切比雪夫多项式 ; 安全性 ; 安全问题 ; 密码共享 ; 密钥协商协议 ; 密钥管理 ; 混沌映射</subject><ispartof>Chinese physics B, 2013-11, Vol.22 (11), p.239-243</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</citedby><cites>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85823A/85823A.jpg</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>王兴元 栾大朋</creatorcontrib><title>A secure key agreement protocol based on chaotic maps</title><title>Chinese physics B</title><addtitle>Chinese Physics</addtitle><description>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</description><subject>Chaos theory</subject><subject>Computer information security</subject><subject>Gongs</subject><subject>Management</subject><subject>Polynomials</subject><subject>Protocols</subject><subject>Security</subject><subject>公共通道</subject><subject>切比雪夫多项式</subject><subject>安全性</subject><subject>安全问题</subject><subject>密码共享</subject><subject>密钥协商协议</subject><subject>密钥管理</subject><subject>混沌映射</subject><issn>1674-1056</issn><issn>2058-3834</issn><issn>1741-4199</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNo9kMtqwzAQRUVpoWnaXyjqrhs3Gj0sZRlCXxDopl2LsSwnbm0rkZxF_r4KCYGB2dxzuRxCHoG9ADNmBqWWBTBVzjifAeRjiokrMuFMmUIYIa_J5BK6JXcp_TJWAuNiQtSCJu_20dM_f6C4jt73fhjpNoYxuNDRCpOvaRio22AYW0d73KZ7ctNgl_zD-U_Jz9vr9_KjWH29fy4Xq8IJkGMhGxTOQQUKNEqQUDW6UlCjYawyKDmfoy65qIUB4PO8F0StpAbkKHTlxZQ8n3rznN3ep9H2bXK-63DwYZ8sZJrpXCxztDxFXQwpRd_YbWx7jAcLzB492aMCe1RgObcA9uQpg09ncBOG9a4d1hdS6nKeu7n4B567Y_0</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>王兴元 栾大朋</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20131101</creationdate><title>A secure key agreement protocol based on chaotic maps</title><author>王兴元 栾大朋</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Chaos theory</topic><topic>Computer information security</topic><topic>Gongs</topic><topic>Management</topic><topic>Polynomials</topic><topic>Protocols</topic><topic>Security</topic><topic>公共通道</topic><topic>切比雪夫多项式</topic><topic>安全性</topic><topic>安全问题</topic><topic>密码共享</topic><topic>密钥协商协议</topic><topic>密钥管理</topic><topic>混沌映射</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>王兴元 栾大朋</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Chinese physics B</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>王兴元 栾大朋</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure key agreement protocol based on chaotic maps</atitle><jtitle>Chinese physics B</jtitle><addtitle>Chinese Physics</addtitle><date>2013-11-01</date><risdate>2013</risdate><volume>22</volume><issue>11</issue><spage>239</spage><epage>243</epage><pages>239-243</pages><issn>1674-1056</issn><eissn>2058-3834</eissn><eissn>1741-4199</eissn><abstract>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</abstract><doi>10.1088/1674-1056/22/11/110503</doi><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-1056
ispartof Chinese physics B, 2013-11, Vol.22 (11), p.239-243
issn 1674-1056
2058-3834
1741-4199
language eng
recordid cdi_proquest_miscellaneous_1762071414
source IOP Publishing Journals
subjects Chaos theory
Computer information security
Gongs
Management
Polynomials
Protocols
Security
公共通道
切比雪夫多项式
安全性
安全问题
密码共享
密钥协商协议
密钥管理
混沌映射
title A secure key agreement protocol based on chaotic maps
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T02%3A03%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20key%20agreement%20protocol%20based%20on%20chaotic%20maps&rft.jtitle=Chinese%20physics%20B&rft.au=%E7%8E%8B%E5%85%B4%E5%85%83%20%E6%A0%BE%E5%A4%A7%E6%9C%8B&rft.date=2013-11-01&rft.volume=22&rft.issue=11&rft.spage=239&rft.epage=243&rft.pages=239-243&rft.issn=1674-1056&rft.eissn=2058-3834&rft_id=info:doi/10.1088/1674-1056/22/11/110503&rft_dat=%3Cproquest_cross%3E1762071414%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1762071414&rft_id=info:pmid/&rft_cqvip_id=47694142&rfr_iscdi=true