首页> 外文会议>International Symposium on Biometrics and Security Technologies >Cryptanalysis of the Chaotic-based Key Agreement Protocols
【24h】

Cryptanalysis of the Chaotic-based Key Agreement Protocols

机译:基于混沌的关键协议协议的密码分析

获取原文

摘要

Recently, Han-Chang showed that Xiao-Liao-Deng's key agreement protocol based on chaotic maps is vulnerable to man-in-the-middle attack and proposed two improved schemes. One works in clock synchronization, and the other can work without synchronization. They claimed that their schemes are secure against replaying attacks and can establish a shared session key. However, we point out that all the aforementioned schemes are Non-contributory, i.e. the malicious party can predetermine the shared session key by the vice of several Chebyshev polynomials passing through the same point. In particular, we demonstrate that the asynchronous key agreement protocol can't resist replaying attack. Therefore, the use of these schemes for secure applications may be discouraged.
机译:近日,韩昌表明,萧寮邓的基于混沌地图的关键协议议定书易受中式攻击的影响,并提出了两个改进的计划。一个工作时钟同步,另一个可以在不同步的情况下工作。他们声称他们的计划是安全的反作识别攻击并可以建立共享会话密钥。但是,我们指出,所有上述方案都是非缴费的,即恶意方可以通过通过同一点的几个Chebyshev多项式的副来预测共享会议密钥。特别是,我们证明异步关键协议协议无法抵抗重放攻击。因此,可能会气动使用这些方案进行安全应用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号