Back close

Security analysis and application of Chebyshev Chaotic map in the authentication protocols

Publication Type : Journal Article

Publisher : International Journal of Computers and Applications

Campus : Chennai

School : School of Engineering

Verified : No

Year : 2019

Abstract : Due to the quick expansion and fast growth of computer networks, remote user's authentication and key agreement protocol is required. Chaotic maps play a very important role in the construction of authentication and key agreement protocol. Recently, many of the key agreement protocols are proposed based on chaotic maps and it can generate secure session key as well as resist known-key attacks. In this paper, it has been illustrated that most of the existing schemes cannot establish secure communication. Moreover, chaotic map-based authentications schemes have been found vulnerable to identity guessing, password guessing, impersonation, stolen smart card, and violation of session key attacks. Although some of the protocol has advantages of low computation cost but they lacks to attain security attributes. Moreover, these schemes do not support verified session key security with a minimum number of messages exchanged. Therefore, a chaotic map-based authentication scheme is essential to overcome existing weaknesses.

Admissions Apply Now