Loading…

Smart card–based password authenticated key agreement protocol using chaotic maps

Summary In 2015, Lee proposed time stamp–based and nonce‐based password authenticated key agreement protocols based on the Chebyshev chaotic map to enhance the security of relevant schemes. However, in this paper, we demonstrate that Lee's protocols are vulnerable to user impersonation and stol...

Full description

Saved in:
Bibliographic Details
Published in:International journal of communication systems 2017-08, Vol.30 (12), p.n/a
Main Authors: Cheng, Ting‐Fang, Chang, Chin‐Chen, Lo, Yu‐Ya
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Summary In 2015, Lee proposed time stamp–based and nonce‐based password authenticated key agreement protocols based on the Chebyshev chaotic map to enhance the security of relevant schemes. However, in this paper, we demonstrate that Lee's protocols are vulnerable to user impersonation and stolen verifier attacks. To overcome these security problems, we thus provide an improved version using a smart card. Security analysis and comparisons show that the proposed protocol is more secure and maintains better performance. Furthermore, we perform a formal verification of the proposed protocol using the widely accepted AVISPA tool for error detection. In 2015, Lee proposed nonce‐based and time stamp–based password authenticated key agreement protocols to enhance the security of relevant schemes. In this paper, we perform a detailed cryptanalysis of Lee's protocols to point out the vulnerability of his protocols to stolen verifier attacks and user impersonation attacks. We thus provide an improved version using a smart card, which can defend against these security problems and meanwhile still maintain better performance and preserve the security requirements of Lee's protocols.
ISSN:1074-5351
1099-1131
DOI:10.1002/dac.3267