Security problems with a chaos-based deniable authentication scheme
From MaRDI portal
Publication:2484726
DOI10.1016/J.CHAOS.2004.12.023zbMATH Open1077.94019arXivnlin/0412023OpenAlexW2042416300MaRDI QIDQ2484726FDOQ2484726
Authors: Gonzalo A. Álvarez
Publication date: 1 August 2005
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Abstract: Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.
Full work available at URL: https://arxiv.org/abs/nlin/0412023
Recommendations
Cites Work
- Cryptography with chaos
- A combined chaotic cryptographic and hashing scheme
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Chaos and cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
- An efficient entire chaos-based scheme for deniable authentication
- A fast chaotic cryptographic scheme with dynamic look-up table
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
- Cryptanalysis of an ergodic chaotic cipher
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Cryptosystem using chaotic keys
- Cryptography with cycling chaos
- Title not available (Why is that?)
Cited In (15)
- Improved digital signature protocol using iterated function systems
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- On the security of a novel key agreement protocol based on chaotic maps
- Secure group key agreement protocol based on chaotic hash
- Security of a key agreement protocol based on chaotic maps
- Chaotic map based key agreement with/out clock synchronization
- Security of public key encryption technique based on multiple chaotic systems
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Hash function based on piecewise nonlinear chaotic map
- Applications of tripled chaotic maps in cryptography
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Comparison of different chaotic maps in particle swarm optimization algorithm for long-term cascaded hydroelectric system scheduling
- Chaotic maps-based three-party password-authenticated key agreement scheme
- An efficient entire chaos-based scheme for deniable authentication
This page was built for publication: Security problems with a chaos-based deniable authentication scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2484726)