Unlock instant, AI-driven research and patent intelligence for your innovation.

A Three-Party Authentication Key Agreement Method Based on Extended Chaos Algorithm

A technology of key agreement and three-party authentication, which is applied in the field of three-party authentication key agreement based on the extended chaotic algorithm, can solve the problem of inability to resist privileged user attacks, offline key guessing attacks, smart card theft, increase the difficulty of protocol operation, and inability to resist internal User attacks and other issues

Active Publication Date: 2020-05-22
南京汇银迅信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2012, Lai et al. proposed a three-party authentication protocol based on chaotic algorithms, but Zhao et al. pointed out that the protocol of Lai et al. cannot resist attacks initiated by internal users and offline key guessing attacks.
Furthermore, when designing the three-party key agreement protocol in the existing technology, most of them use time stamping technology to avoid replay attacks, and time stamping technology requires network clock synchronization between the server and the user, which increases the difficulty of the operation of the protocol
Moreover, the existing three-party key agreement protocol based on chaotic algorithm does not fully consider the security of the protocol, and cannot resist attacks such as privileged user attacks, offline key guessing attacks, and smart card theft;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Three-Party Authentication Key Agreement Method Based on Extended Chaos Algorithm
  • A Three-Party Authentication Key Agreement Method Based on Extended Chaos Algorithm
  • A Three-Party Authentication Key Agreement Method Based on Extended Chaos Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0080] Theories related to the three-party authentication key agreement protocol method based on the extended chaotic algorithm provided by the embodiment of the present invention:

[0081] Relevant theoretical knowledge about Chebyshev (Chebyshev) chaos algorithm.

[0082] Chebyshev Chaos Algorithm:

[0083] Definition 2.1n-dimensional Chebyshev polynomial T n (x):[-1,1]→[-1,1] is defined as T n (x)=cos(narccos(x)), where: n is an integer, x is a real number and x∈[−1,1].

[0084] Definition 2.2 Let n∈Z, variable x∈[-1,1], Chebyshev polynomial T n (x):[-1,1]→[-1,1] The iteration relation is T n (x)=2xT n-1 (x)-T n-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security protocols, and discloses a three-party authentication key negotiation method based on an extended chaotic algorithm, comprising: a trusted server first generates a large prime number p, a real number z∈(‑∞,+∞), a hash The Greek function h() and its own secret key X s As a basic parameter for protocol execution; in the initialization phase, U i and U j First register on the trusted server S, respectively obtain a valid smart card (smart card); then, the information sender U i and responder U j With the help of the trusted server S, a secure session key is negotiated after the registration phase, login and key agreement phase, and key update phase. The invention has higher security and lower calculation overhead. Compared with the protocol of Islam etc., the method of the present invention needs 4 communications, while the protocol of Islam etc. requires 8 communications, and the method of the present invention does not need complex network clock synchronization technology.

Description

technical field [0001] The invention belongs to the technical field of data algorithms, in particular to a three-party authentication key negotiation method based on an extended chaotic algorithm. Background technique [0002] With the development of wireless network technology, wireless communication becomes very important. But because wireless users exchange information on the open channel, its security cannot be guaranteed. The authentication and key agreement protocol can provide data privacy protection and ensure the confidential transmission of data. Therefore, research on keys and negotiation protocols becomes particularly important in wireless network applications. [0003] Due to the high efficiency and security of the extended chaotic algorithm, researchers recently proposed many two-party and three-party authenticated key agreement protocols based on the extended chaotic algorithm. In 2010, Wang et al proposed a three-party key agreement protocol based on chaot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/00
CPCH04L9/001H04L9/0838H04L9/0844H04L9/321
Inventor 闫丽丽
Owner 南京汇银迅信息技术有限公司