Font Size: a A A

Research On Chaotic Map-based Romate Authenticated Key Agreement Protocol And Its Applications

Posted on:2018-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:C YuanFull Text:PDF
GTID:2348330515951610Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and popularization of the information technology,the security and reliability of remote commmunication become one of the focuses which the people concern.Due to its secure and enfficient authentication and key agreement functions,the chaotic maps-based remote authentication protocol has become a hotspot among the information security scholars.In light of the low computational cost of chaotic maps operations,the chaotic maps-based authenticated key agreement protocol is able to achieve efficient and scure communication simultaneously.In this thesis,we make a careful study on chaotic maps-based authenticated key agreement protocol and its application and achieve the following contributions:(1)Firstly,a provable secure three-factor authentication protocol is proposed in this thesis.After the review and cryptanalysis of Zhang et.al.'s three-factor authentication scheme,we point out that the assumptions of biometrics in current works are too strong to ensure the security of three-factor authentication.Motivated by this problem,we propose a "truly" chaotic maps-based three-factor authentication with provable security.The formal scurity proof in the random oracle model shows that the proposed protocol has better security attributes compared with current works.(2)Secondly,an efficient three-factor authentication protocol is presented to achieve an ideal trade-off between security and efficiency.After the cryptanalysis of Jiang et.al.'s chaotic maps-based three-factor authentication scheme,we show that the password updating algorithm in Jiang et.al.'s scheme is flawed.To remedy the drawbacks,we propose an improved chaotic maps-based three-factor authentication,while quadratic residuosity is also introduced to enhance the efficency.Moreover,we evaluate the security and efficency of the proposed scheme by using BAN logic and simulation experiments.The results show that our scheme has a better efficency compared with other works.(3)Last but not least,we make a research on the application of chaotic maps-based three-factor authentication protocol in multi-server environment.The system model of multi-server environment and a brief classification of related authentication protocols are present firstly.After that,we review Chatterjee et.al.'s multi-server authentication protocol and find that their scheme is vulnerable to insider attack and stolen smart card attack.An improvement is proposed to achieve a better seucirty in multi-server environment.The result of security evaluation shows that the proposed protocol is able to effectively resist all known attacks.
Keywords/Search Tags:authentication, key agreement, chaoic maps, three-factor
PDF Full Text Request
Related items