Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- 289 Downloads
An authenticated key agreement protocol is a protocol for information security over insecure networks. Due to the excellent properties of chaotic system, chaos-related cryptography has received a certain development, and recently, researchers have presented some three-party authenticated key agreement protocols based on the chaotic maps. Unfortunately, most of the chaotic maps-based key agreement protocols use a password to achieve the key agreement, and this leads to some security loopholes. First, the server has to store a sensitive password table, and it would be dangerous if the server was compromised or the password table was leaked. Besides, the low-entropy passwords are vulnerable to some password-related attacks, such as insider attack and password guessing attacks. In this paper, we design a communication- and computation-efficient chaotic maps-based three-party authenticated key agreement protocol without password and clock synchronization, and formally analyze the security using Burrows–Abadi–Needham logic. In addition to the formal analysis, we also prove that the presented protocol is free from most of the common attacks, and compare the performance and functionality with other related protocols. The result of the analysis and comparisons demonstrate that our protocol is more efficient and practical for real applications.
KeywordsChaotic maps Authentication Key agreement Information security
This work was supported by the National Natural Science Foundation of China under Grant Nos. 61300220 & 61170296 & 61202462, the Research Fund of the State Key Laboratory of Software Development Environment, BUAA under Grant No. SKLSDE-2014KF-02, the China Postdoctoral Science Foundation Funded Project under Grant No. 2014M550590, the Scientific Research Fund of Hunan Provincial Education Department (Nos. 13C324 & 14A047), and the National Nature Science Foundation of Hunan province under Grant No. 13JJ3091.
- 1.Liu, B., Peng, J.: Nonlinear dynamics. High Education Press, Beijing (2004)Google Scholar
- 16.Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, 2009, ICC’09, pp. 1–6. Dresden, Germany (2009)Google Scholar
- 20.Tan, Z.W.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 1–10 (2013)Google Scholar
- 25.Lai, H., Xiao, J., Li, L., et al.: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. Article ID 454823, 17 pages(2012). doi: 10.1155/2012/454823
- 28.Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. (2014, in press). doi: 10.1007/s11071-014-1304-6
- 35.Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Sci. 1989(426), 233–271 (1871)Google Scholar