Presentation of a Two-Party Key Agreement Protocol based on Chaos

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 907

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

EOESD01_113

تاریخ نمایه سازی: 11 خرداد 1393

چکیده مقاله:

One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been performed. Recently, in 2012, Lee et al. proposed a key agreement protocol using smart cards and claimed their protocol is secure and efficient. However, He et al. proved that the Lee et al.'s protocol vulnerable to the privileged insider attack and the denial of service attack, and also the protocol cannot protect the user's true identity. We also point out the protocol requires timestamp information and the cost of card and reader makes this protocol costly. To overcome these weaknesses, we propose a key agreement protocol based on Chebyshev chaotic map without using smart card. Our protocol allows users to anonymously interact with the server. Moreover, analysis shows that the proposed protocol can successfully resist the current attacks.

نویسندگان

Nahid Yahyapoor

Department of Electrical Engineering, Khavaran Institute of Higher Education, Mashhad

Saeed Shaerbaf

Department of Electrical Engineering, International Universityof Imam Reza, Mashhad

Morteza Nikooghadam

Department of Computer Engineering, International Universityof Imam Reza, Mashhad

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Bergamo, P. , & Arco, P. D. , & Santis, ...
  • Diffie, W. _ & Hellman, M. (1976). New directions in ...
  • Han, S. (2008). Security of a key agreement protocol based ...
  • Han, S. , & Chang, E. (2009). Chaotic map based ...
  • He, D. , & Chen, Y. _ & Chen, J. ...
  • Kocarev, L. , & Tasev, Z. (2003). Public-key encryption based ...
  • Lee, C. C. , & Chen, C. C. , & ...
  • Niu, Y. , & Wang, X. (2011). An anonymous key ...
  • Tseng, H. R. , &c Jan, R. H. _ & ...
  • Wang, X. , &c Zhao, J. (2010). An improved key ...
  • Xiang, T. , & Wong, K. , & Liao, X. ...
  • Xiao, D. _ & Liao, X. , & Deng, S. ...
  • Yoon, E. J. (2012). Efficiency and security problems of anonymous ...
  • Yoon, E. J. , & Jeon, I. S. (2011). An ...
  • Zhang, L. (2008). Cryptanalysis of the public key encryption based ...
  • نمایش کامل مراجع