Security problems with a chaos-based deniable authentication scheme
From MaRDI portal
(Redirected from Publication:2484726)
Abstract: Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.
Recommendations
Cites work
- scientific article; zbMATH DE number 2009957 (Why is no real title available?)
- A combined chaotic cryptographic and hashing scheme
- A fast chaotic cryptographic scheme with dynamic look-up table
- An efficient entire chaos-based scheme for deniable authentication
- Analysis of some recently proposed chaos-based encryption algorithms
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Chaos and cryptography
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptography with chaos
- Cryptography with cycling chaos
- Cryptosystem using chaotic keys
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
Cited in
(15)- Comparison of different chaotic maps in particle swarm optimization algorithm for long-term cascaded hydroelectric system scheduling
- Improved digital signature protocol using iterated function systems
- Secure group key agreement protocol based on chaotic hash
- Chaotic map based key agreement with/out clock synchronization
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- On the security of a novel key agreement protocol based on chaotic maps
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Applications of tripled chaotic maps in cryptography
- Security of public key encryption technique based on multiple chaotic systems
- Security of a key agreement protocol based on chaotic maps
- Hash function based on piecewise nonlinear chaotic map
- An efficient entire chaos-based scheme for deniable authentication
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
This page was built for publication: Security problems with a chaos-based deniable authentication scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2484726)