Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow communication parties to exchange session keys in an authentic and secure manner. Guo and Chang recently proposed a novel password-authenticated key agreement protocol using smart card based on chaotic maps. They claimed that the protocol achieves the security goal of mutual authentication, as well as other essential security requirements. In this paper, we show that this protocol is susceptible to key-compromise impersonation and parallel session attacks. We also identify two weaknesses in the password change phase of the protocol that leads to authentication with old password and denial of service, respectively
In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobil...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
[[abstract]]Mobile users can roam into foreign networks and transmit messages to foreign agents, and...
In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using cha...
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo e...
The security is a critical issue for business purposes. For example, the cloud meeting must consider...
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol compri...
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement proto...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
Smart card based password for authentication has become a common trend. Although smart card brings c...
[[abstract]]Three-party authenticated key exchange (3PAKE) protocol allows two communication users t...
This paper initiates the study of two specific security threats on smart-card-based password authent...
In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobil...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
[[abstract]]Mobile users can roam into foreign networks and transmit messages to foreign agents, and...
In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using cha...
Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo e...
The security is a critical issue for business purposes. For example, the cloud meeting must consider...
Klein et al. proposed a key exchange protocol using chaos synchronization. The first protocol compri...
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement proto...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
Smart card based password for authentication has become a common trend. Although smart card brings c...
[[abstract]]Three-party authenticated key exchange (3PAKE) protocol allows two communication users t...
This paper initiates the study of two specific security threats on smart-card-based password authent...
In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobil...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...