Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
A novel key agreement protocol based on chaotic maps
Information Sciences: an International Journal
A chaotic maps-based key agreement protocol that preserves user anonymity
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A security-enhanced key agreement protocol based on chaotic maps
Security and Communication Networks
Hi-index | 0.00 |
In 2007, Xiao et al.'s proposed a novel key agreement protocol based on chaotic maps. Recently, Han et al., however, pointed out that Xiao et al.'s protocol is not secure against their developed new attacks which can hinder the user and the server from accomplishing a shared secret session key. In addition Han et al.'s attack, the current paper demonstrates that Xiao et al.'s protocol is vulnerable to off-line password guessing attack. Furthermore, the current paper presents a new key agreement protocol based on chaotic maps in order to isolate such security problems. In contrast with Xiao et al.'s protocol, the proposed protocol is more secure and can be reduced the numbers of communication rounds.