Skip to main content

Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity

  • Conference paper
Grid and Pervasive Computing (GPC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7861))

Included in the following conference series:

  • 1416 Accesses

Abstract

In 2009, Tseng et al. proposed a key agreement protocol based on chaotic maps. Tseng et al. claimed that their protocol preserve user anonymity. However, Tseng et al.’s protocol is insecure against the insider attack. Nui et al. proposed a new anonymous key agreement protocol in 2011. Unfortunately, Nui et al.’s protocol cannot provide user anonymity and has computational efficiency problem. We introduce a new key agreement protocol based on Chebyshev chaotic map. Our protocol overcomes these security problems and provides user anonymity.

This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency)"(KCA-2012-12-912-06-003).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  2. Tseng, H.-R., Jan, R.-H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of the 2009 IEEE International Conference on Communications, ICC 2009, Dresden, Germany, June 14-18, pp. 1–6 (2009)

    Google Scholar 

  3. Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1), 65–71 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  4. Mason, J.C., Handscomb, D.C.: Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton (2003)

    MATH  Google Scholar 

  5. Kocarev, L., Tasev, Z.: Public-key encryption based on Chebyshev maps. In: Proceedings of the International Symposium on Circuits and Systems, ISCAS 2003, vol. 3, pp. III-28–III-31 (May 2003)

    Google Scholar 

  6. Bergamo, P., D”Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems-I 52(7), 1382–1393 (2005)

    Article  MathSciNet  Google Scholar 

  7. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos, Solitons & Fractals 38(3), 764–768 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  8. Yoon, E.-J., Yoo, K.-Y.: A new key agreement protocol based on chaotic maps. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol. 4953, pp. 897–906. Springer, Heidelberg (2008)

    Google Scholar 

  9. Lee, Y., Kim, S., Won, D.: Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Elsevier Computers and Electrical Engineering 36(1), 213–223 (2010)

    Article  MATH  Google Scholar 

  10. Nam, J., Paik, J., Kim, U.M., Won, D.: Security Enhancement to a Password-Authenticated Group Key Exchange Protocol for Mobile Ad-hoc Networks. IEEE Communications Letters 12(2), 127–129 (2008)

    Article  Google Scholar 

  11. Lee, C., Park, S., Lee, K., Won, D.: An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. LNCS, vol. 6935, pp. 488–495. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Nam, J., Lee, K., Paik, J., Paik, W., Won, D.: Security Improvement on a Group Key Exchange Protocol for Mobile Networks. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part IV. LNCS, vol. 6785, pp. 123–132. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Nam, J., Paik, J., Lee, B., Lee, K., Won, D.: An Improved Protocol for Server-Aided Authenticated Group Key Establishment. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part V. LNCS, vol. 6786, pp. 437–446. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Yang, H., Lee, K., Lee, C., Kwak, J., Won, D.: A Security Weakness in Tseng et al Key Agreement Protocol. In: Proc. of JWIS 2011, The 6th Joint Workshop on Information Security (October 2011)

    Google Scholar 

  15. Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simulat. 16(4), 1986–1992 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  16. Yoon, E.-J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simulat. 17, 2735–2740 (2012)

    Article  MATH  Google Scholar 

  17. Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simulat. 17, 2969–2977 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  18. Oh, S., Kwak, J., Lee, S., Won, D.: Security analysis and applications of standard key agreement protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003, Part II. LNCS, vol. 2668, pp. 191–200. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)

    Article  Google Scholar 

  20. Bergamo, P., D’Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomial. IEEE Trans. Circ. Syst.-I 52(7), 1382–1393 (2005)

    Article  Google Scholar 

  21. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Soliton Fract. 37(3), 669–674 (2008)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, H., Qiuyan, J., Lee, H., Lee, K., Won, D. (2013). Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38027-3_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38026-6

  • Online ISBN: 978-3-642-38027-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics