Abstract

A three-party authenticated key agreement (3PAKA) protocol allows two protocol entities to authenticate and agree on a common session key over common communication channels with the help of a trust server. Due to the better robustness and high computation efficiency, Chebyshev chaotic maps technology has been widely used in the authenticated key agreement protocol. In recent years, many researches of the 3PAKA protocol based on Chebyshev chaotic maps have been well-documented. However, cryptanalysis of previous schemes showcased that existing 3PAKA protocols commonly could not resist known session specific temporary attack and could not guarantee users anonymity. In addition, they assumed that the communication channels were absolutely secure during the registration process, which is impracticable in major applications. To overcome the existing weaknesses, we propose a security-enhanced protocol. Finally yet importantly, the security of our proposed scheme has been validated with Strand Space technology and ProVerif tool. Contrary to the existing schemes, the proposed protocol showcased improved security with lower computation and communication cost.

Highlights

  • The growing density of network applications increases the need for secure communications between different communication entities

  • We demonstrate that the protocol proposed by Xie et al [32] could not withstand known session specific temporary attack

  • To remedy the existing weaknesses while preserve the efficiency, we propose an enhanced anonymous 3PAKA protocol based-on Chebyshev chaotic maps

Read more

Summary

INTRODUCTION

The growing density of network applications increases the need for secure communications between different communication entities. In 2018, Xie et al [32] proposed a securityenhanced anonymous three-party authentication key agreement protocol They pointed out that existing protocols were vulnerable to stolen-verifier attack and off-line password guessing attack, and proposed a new scheme with enhanced security and efficiency. A practical 3PAKA protocol should enable secure registration over open channels; so that during the authentication and key agreement phase it can satisfy security needs such as users’ anonymity, anti-session specific temporary information, anti-key compromise impersonation attack, full forward. To remedy the existing weaknesses while preserve the efficiency, we propose an enhanced anonymous 3PAKA protocol based-on Chebyshev chaotic maps. In comparison with the former protocols, this paper makes the following contributions:.

MATHEMATICAL PRELIMINARIES
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call