Font Size: a A A

Research On Chaotic Map Based Remote Authentication Scheme

Posted on:2017-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:C X DuFull Text:PDF
GTID:2348330488979940Subject:Mathematics and applied mathematics
Abstract/Summary:PDF Full Text Request
Recently, the rapid development of network technology accelerates the pace of the information society. Network communication has been widely used in lots of fields such as military, transportation, economic, cultural and so on. However, it not only brings convenience but also great challenges for the society. As an important mechanism to security communication, chaotic map based remote authentication scheme has been widely used in network system, which has become an important hot topic researched by scholars at home and abroad.In this paper, we mainly research on three types of chaotic map based remote authentication schemes. On the basis of cryptanalysis of existing authentication schemes, we design a series of high level security and efficiency new schemes based on the cryptography tools such as Chebyshev chaotic maping, hash function and random number and analyse the performance of new schemes.(1) We research Giri et al.'s chaotic map based remote authentication scheme. Then we show that their scheme is vulnerable to impersonation attack, off-line password guessing attack and it can not provide the forward security. In order to improve the security of scheme, we design a new chaotic map based remote authentication scheme and analyse the performance of it using BAN-logic.(2) We analyze Lin's chaotic map based dynamic ID authenticated key agreement scheme. This scheme can not resist Bergamo attack and stolen mobile device attack. In addition to this, adversary can further process impersonation attack, off-line password guessing attack, denial of service attack and forward security attack once he/she acquires user's smart card. In order to enhance the security of the scheme, we design a new extended chaotic map based mobile dynamic ID authenticated key agreement scheme and analyze the security of it.(3) We cryptanalyze Islam's chaotic map based three party remote authentication scheme. Analysis reveals that adversary can make impersonation attack and off-line password guessing attack after he/she recovers the information which is stored in the smart card. Then we design a chaotic map based three party remote authentication scheme without using smart card and analyze the security of new scheme. Compared with the former scheme, our new scheme possesses higher operation efficiency and safety.
Keywords/Search Tags:remote authentication, chaotic map, dynamic ID, telecare medicine information system, smart card
PDF Full Text Request
Related items