A secure key agreement protocol based on chaotic maps
To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol ex...
Gespeichert in:
Veröffentlicht in: | Chinese physics B 2013-11, Vol.22 (11), p.239-243 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 243 |
---|---|
container_issue | 11 |
container_start_page | 239 |
container_title | Chinese physics B |
container_volume | 22 |
creator | 王兴元 栾大朋 |
description | To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol. |
doi_str_mv | 10.1088/1674-1056/22/11/110503 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1762071414</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>47694142</cqvip_id><sourcerecordid>1762071414</sourcerecordid><originalsourceid>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</originalsourceid><addsrcrecordid>eNo9kMtqwzAQRUVpoWnaXyjqrhs3Gj0sZRlCXxDopl2LsSwnbm0rkZxF_r4KCYGB2dxzuRxCHoG9ADNmBqWWBTBVzjifAeRjiokrMuFMmUIYIa_J5BK6JXcp_TJWAuNiQtSCJu_20dM_f6C4jt73fhjpNoYxuNDRCpOvaRio22AYW0d73KZ7ctNgl_zD-U_Jz9vr9_KjWH29fy4Xq8IJkGMhGxTOQQUKNEqQUDW6UlCjYawyKDmfoy65qIUB4PO8F0StpAbkKHTlxZQ8n3rznN3ep9H2bXK-63DwYZ8sZJrpXCxztDxFXQwpRd_YbWx7jAcLzB492aMCe1RgObcA9uQpg09ncBOG9a4d1hdS6nKeu7n4B567Y_0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1762071414</pqid></control><display><type>article</type><title>A secure key agreement protocol based on chaotic maps</title><source>IOP Publishing Journals</source><creator>王兴元 栾大朋</creator><creatorcontrib>王兴元 栾大朋</creatorcontrib><description>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</description><identifier>ISSN: 1674-1056</identifier><identifier>EISSN: 2058-3834</identifier><identifier>EISSN: 1741-4199</identifier><identifier>DOI: 10.1088/1674-1056/22/11/110503</identifier><language>eng</language><subject>Chaos theory ; Computer information security ; Gongs ; Management ; Polynomials ; Protocols ; Security ; 公共通道 ; 切比雪夫多项式 ; 安全性 ; 安全问题 ; 密码共享 ; 密钥协商协议 ; 密钥管理 ; 混沌映射</subject><ispartof>Chinese physics B, 2013-11, Vol.22 (11), p.239-243</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</citedby><cites>FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/85823A/85823A.jpg</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>王兴元 栾大朋</creatorcontrib><title>A secure key agreement protocol based on chaotic maps</title><title>Chinese physics B</title><addtitle>Chinese Physics</addtitle><description>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</description><subject>Chaos theory</subject><subject>Computer information security</subject><subject>Gongs</subject><subject>Management</subject><subject>Polynomials</subject><subject>Protocols</subject><subject>Security</subject><subject>公共通道</subject><subject>切比雪夫多项式</subject><subject>安全性</subject><subject>安全问题</subject><subject>密码共享</subject><subject>密钥协商协议</subject><subject>密钥管理</subject><subject>混沌映射</subject><issn>1674-1056</issn><issn>2058-3834</issn><issn>1741-4199</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNo9kMtqwzAQRUVpoWnaXyjqrhs3Gj0sZRlCXxDopl2LsSwnbm0rkZxF_r4KCYGB2dxzuRxCHoG9ADNmBqWWBTBVzjifAeRjiokrMuFMmUIYIa_J5BK6JXcp_TJWAuNiQtSCJu_20dM_f6C4jt73fhjpNoYxuNDRCpOvaRio22AYW0d73KZ7ctNgl_zD-U_Jz9vr9_KjWH29fy4Xq8IJkGMhGxTOQQUKNEqQUDW6UlCjYawyKDmfoy65qIUB4PO8F0StpAbkKHTlxZQ8n3rznN3ep9H2bXK-63DwYZ8sZJrpXCxztDxFXQwpRd_YbWx7jAcLzB492aMCe1RgObcA9uQpg09ncBOG9a4d1hdS6nKeu7n4B567Y_0</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>王兴元 栾大朋</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20131101</creationdate><title>A secure key agreement protocol based on chaotic maps</title><author>王兴元 栾大朋</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c314t-4fa3cc1b1517a4141bf7b51da800b8a4229a7623d38112920513d5471a2a37be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Chaos theory</topic><topic>Computer information security</topic><topic>Gongs</topic><topic>Management</topic><topic>Polynomials</topic><topic>Protocols</topic><topic>Security</topic><topic>公共通道</topic><topic>切比雪夫多项式</topic><topic>安全性</topic><topic>安全问题</topic><topic>密码共享</topic><topic>密钥协商协议</topic><topic>密钥管理</topic><topic>混沌映射</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>王兴元 栾大朋</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Chinese physics B</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>王兴元 栾大朋</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure key agreement protocol based on chaotic maps</atitle><jtitle>Chinese physics B</jtitle><addtitle>Chinese Physics</addtitle><date>2013-11-01</date><risdate>2013</risdate><volume>22</volume><issue>11</issue><spage>239</spage><epage>243</epage><pages>239-243</pages><issn>1674-1056</issn><eissn>2058-3834</eissn><eissn>1741-4199</eissn><abstract>To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of conarnon attacks, but also solve the problems of key management and security issues existing in Gong et al.' s protocol.</abstract><doi>10.1088/1674-1056/22/11/110503</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-1056 |
ispartof | Chinese physics B, 2013-11, Vol.22 (11), p.239-243 |
issn | 1674-1056 2058-3834 1741-4199 |
language | eng |
recordid | cdi_proquest_miscellaneous_1762071414 |
source | IOP Publishing Journals |
subjects | Chaos theory Computer information security Gongs Management Polynomials Protocols Security 公共通道 切比雪夫多项式 安全性 安全问题 密码共享 密钥协商协议 密钥管理 混沌映射 |
title | A secure key agreement protocol based on chaotic maps |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T02%3A03%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20key%20agreement%20protocol%20based%20on%20chaotic%20maps&rft.jtitle=Chinese%20physics%20B&rft.au=%E7%8E%8B%E5%85%B4%E5%85%83%20%E6%A0%BE%E5%A4%A7%E6%9C%8B&rft.date=2013-11-01&rft.volume=22&rft.issue=11&rft.spage=239&rft.epage=243&rft.pages=239-243&rft.issn=1674-1056&rft.eissn=2058-3834&rft_id=info:doi/10.1088/1674-1056/22/11/110503&rft_dat=%3Cproquest_cross%3E1762071414%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1762071414&rft_id=info:pmid/&rft_cqvip_id=47694142&rfr_iscdi=true |