Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
نویسندگان
چکیده
Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. So, in our paper, we firstly propose a provable secure password authenticated key agreement protocol using chaotic maps towards multiple servers to server architecture in the standard model. The multiple servers to server architecture will solve the problems single-point of security, single-point of efficiency and single-point of failure in the centralized registration center towards multi-server architecture. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, we give the security proof in the standard model and the efficiency analysis of our proposed scheme. IDL International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL International Digital Library 2 | P a g e Copyright@IDL-2017 Motivation behind choosing the project Chaos theory used to cryptography. Chaotic system is extremely sensitive to initial parameters, unpredictability, blondeness, etc. chaotic sequence generated by chaotic system has the properties of non-periodicity and pseudo-randomness. Chaos theory and chaotic system have exploited a new way for cryptography. Cryptographic primitive, key agreement protocol allows two or more parties to agree on shared keys which will be used to protect their later communication. Then, combining chaos theory and key agreement primitive, many authenticated key exchange (AKE) protocols. One-way authenticated key agreement scheme (OWAKE) based on chaotic maps with multi-server architecture. The OWAKE scheme is widely used to no need for mutual authentication environment on Internet, such as readers-to-journalists model and patient-to-expert model. The chaotic maps, multiple servers to server architecture (MSTSA) to solve the problems caused by centralized architecture, such as multi-server architecture with the registration center (RC). Multi-server authenticated key agreement (MSAKA) architecture is more popular among the AKE protocols.
منابع مشابه
A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server
With rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. But the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four secur...
متن کاملA Novel Client-to-Client Password-Authenticated Key Exchange Protocol Using Chaotic Maps in The Standard Model
Until now, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud s...
متن کاملA Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm
Until now, the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud st...
متن کاملProvably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
Nowadays, the distributed password-authenticated key agreement schemes become more and more popular. Compare with the three traditional architectures (client/server, two clients/server and multi-server), the distributed architecture can solve problems of single-point of security, single-point of efficiency and single-point of failure. Moreover, it has the characteristics of scalability, flexibi...
متن کاملOn the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol
Chaotic map has been receiving increasing attention in the cryptographic literature. There are various scholars working on a particular type of authenticated key exchange protocol using chaotic map in the recent years. Very recently, Li et al. proposed a new three-party-authenticated key agreement protocol based on chaotic maps without storing a password table in a server. Compared with previou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016