Cryptanalysis of a key agreement protocol based on chaotic Hash

  • Authors:
  • Debiao He;Muhammad Khurram Khan

  • Affiliations:
  • School of Mathematics and Statistics, Wuhan University, Wuhan 430072, China;Center of Excellence in Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Kingdom of Saudi Arabia

  • Venue:
  • International Journal of Electronic Security and Digital Forensics
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the rapid development of theory and application of chaos, the chaotic Hash has been widely used in cryptosystems. Recently, Guo and Zhang proposed a secure key agreement protocol based on chaotic Hash. They claimed that their protocol could withstand various attacks. Unfortunately, by giving concrete attacks, we demonstrate that Guo and Zhang's protocol is vulnerable to the offline password guessing attack. The analysis shows their protocol is not secure for practical application.