||Authentication Mechanisms Based on Chaotic Maps
||Institute of Computer & Communication
Zero knowledge proofs
Authentication protocols and key exchange schemes are major research techniques of entity identification of users or servers for improvement of accuracy and security in internet applications, which need to be safeguarded by various types of verification processes. However, most researches mainly focus on single issue, which could induce the security problem. Thus there still exist possibilities for further improvements. Since 1987, the concept of zero knowledge proofs has been widely used for signing networks. However, its related common identification methods are only good for an individual user. For current increasingly complex networks, which are connected through many unidentified servers, as a result, we have to encrypt the message by adopting different kinds of session keys.
Smart cards are very popular for commerce and computer network communication applications. Therefore, developing a method that combines smart cards and the technology of cryptography so that the servers can effectively and accurately recognize the identity of each user is a necessity.
The technique of chaotic maps, which can be treated as a new encryption technology, is also widely adopted in communication protocols and key agreements for recent years. In this dissertation, we propose an enhancement authentication protocol, which includes authentication and key exchange capabilities, by taking the advantages of zero knowledge proofs and chaotic maps. In addition, we use chaotic maps to provide an innovative smart card remote authentication scheme. We compare the protocol and the proposed scheme with the other related researches to prove that it can achieve higher security. To make it even more useful, we use BAN-Logic to verify the security of the structure.
List of Tables IX
List of Figures XI
Chapter 1 Introduction 1
Chapter 2 Preliminaries 5
2.1 Zero Knowledge Proofs 5
2.2 Improved Zero Knowledge Proofs 7
2.3 Characters of Chaotic Maps 8
2.4 Chaotic Maps Problems 10
2.5 Introduction of BAN-Logic 13
Chapter 3 Authentication Protocol Using Zero Knowledge Proofs and Chaotic Maps 15
3.1 System Initialization Stage 15
3.2 Unilateral Authentication Protocol with Key Exchange Capability 16
3.3 Mutual Authentication Protocol with Key Exchange Capability 19
3.4 Practical Applications 23
3.5 Applying BAN-Logic for Verification 29
3.6 Security and Functionality Analyses 32
3.6.1 Security analysis 32
3.6.2 Security and functionality comparison 35
Chapter 4 Authentication Scheme Using Smart Cards Based on Chaotic Maps 37
4.1 Notations 38
4.2 Description of Each Phase 39
4.3 Applying BAN-Logic for Verification 47
4.4 Security and Computation Cost Analyses 51
4.4.1 Security analysis 51
4.4.2 Computation cost analysis and comparison 54
Chapter 5 Conclusions 57
5.1 Authentication Protocol Using Zero Knowledge Proofs and Chaotic Maps 57
5.2 Authentication Scheme Using Smart Cards Based on Chaotic Maps 58
5.3 Future Research Perspective 58
 J. Camenisch, S. Hohenberger and A. Lysyanskaya, “Compact e-cash,” in Advances in Cryptology – EUROCRYPT’05, 2005, vol. 3494, LNCS, pp. 302-321.
 J. Camenisch, A. Lysyanskaya and M. Meyerovich, “Endorsed e-cash,” in Proc. IEEE Symposium on Security and Privacy (S&P 2007), May 2007.
 J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” Lecture Notes in Computer Science, Springer-Verlag, Berlin, vol. 2576, pp. 268-289, 2003.
 K. Chain and W. C. Kuo, “A new digital signature scheme based on chaotic maps,” Nonlinear Dynamics, vol.74, no.4, pp. 1003-1012, 2013.
 D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology, 1983, Springer-Verlag US, pp. 199-203.
 G. R. Chen, Y. B. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
 H. Y. Chien, J. K. Jan and Y. M. Tseng, “An efficient and practical solution to remote authentication: Smart card,” Computer and Security, vol. 21, no. 4, pp. 372-375, 2002.
 Y. H. Chuang and Y. M. Tseng, “Towards generalized ID-based user authentication for mobile multi-server environment,” International Journal of Communication Systems, vol. 25, no. 4, pp. 447–460, 2012.
 F. Dachselt and W. Schwarz, “Chaos and cryptography,” IEEE Transactions on Circuits and Systems I-Regular Papers, vol. 48, no. 12, pp. 1498-1509, 2001.
 S. J. Deng, Y. T. Li and D. Xiao, “Analysis and improvement of a chaos-based Hash function construction,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 5, pp. 1338-1347, 2010.
 C. I. Fan, Y. C. Chan and Z. K. Zhang, “Robust remote authentication scheme with smart cards,” Computers and Security, vol. 24, no. 8, pp. 619-628, 2005.
 U. Feige, A. Fiat and A. Shamir, “Zero knowledge proofs of identity,” Journal of Cryptology, vol. 1, no. 2, pp. 77-94, 1988.
 A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in Advances in Cryptology---CRYPTO '86, 1987, vol. 263, LNCS, pp. 186-194.
 A. Fiat and A. Shamir, “Unforgivable proofs of identity,” in Proc. SECURICOM’87, 1987, pp. 147-153.
 J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1988.
 M. Gohar, H. Jung and S. J. Koh, “Distributed mapping management of identifiers and locators in mobile-oriented Internet environment,” International Journal of Communication Systems, vol. 27, no. 1, pp. 95-115, 2014.
 S. Goldwasser, S. Micali and C. Rackoﬀ, “The knowledge complexity of interactive proof-systems,” in Proc. Seventeenth Annual ACM Symposium on Theory of computing (STOC ’85), 1985, pp. 291–304.
 J. Groth, “Non-interactive zero-knowledge arguments for voting,” in Proc. ACNS ’05, 2005, vol. 3531, LNCS, pp. 467-482.
 C. Guo, C. C. Chang and C. Y. Sun, “Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 2, pp. 99-109, 2013.
 C. Guo and C. C. Chang, “Chaotic maps-based password-authenticated key agreement using smart cards,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 6, pp. 1433-1440, 2013.
 L. Harn and D. Huang, “A protocol for establishing secure communication channels in a large network,” IEEE Transactions on Knowledge and Data Engineering, vol. 6, no. 1, pp. 188-191, 1994.
 D. B. He, Y. T. Chen and J. H. Chen, “Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol,” Nonlinear Dynamics, vol. 69, no. 3, pp. 1149-1157, 2012.
 D. J. He, M. D. Ma, Y. Zhang, C. Chen and J. J. Bu, “A strong user authentication scheme with smart cards for wireless communications,” Computer Communications, vol. 34, no. 3, pp. 367-374, 2011.
 D. J. He, C. Chen, M. D. Ma, S. M. Chan and J. J. Bu, “A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks,” International Journal of Communication Systems, vol. 26, no. 4, pp. 495–504, 2013.
 M. S. Hwang and W. P. Yang, “Conference key distribution schemes for secure digital mobile communications,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 2, pp. 416-420, 1995.
 T. Hwang and W. C. Ku, “Reparable key distribution protocols for internet environments,” IEEE Transactions on Communications, vol. 43, no. 5, pp. 1947-1949, 1995.
 N. Ishida, S. Matsuo and W. Ogata, “Divisible voting scheme,” in Proc. 6th International Conference (ISC 2003), 2003, vol. 2851, LNCS, pp. 137-150.
 W. S. Juang, S. T. Chen and H. T. Liaw, “Robust and efficient password-authenticated key agreement using smart cards,” IEEE Transactions on Industrial Electronics, vol. 55, no. 6, pp. 2551-2556, 2008.
 L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001.
 W. C. Kuo, K. Chain, J. C. Cheng and J. F. Yang, “An enhanced robust and efficient password-authenticated key agreement using smart cards,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 127-132, April, 2012.
 W. C. Kuo and S. M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
 C. S. Laih, F. K. Tu and W. C. Tai, “Remarks on the LUC public key system,” Electronics Letters, vol. 30, no. 2, pp. 123-124, 1994.
 C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, “An extended chaotic maps-based key agreement protocol with user anonymity,” Nonlinear Dynamics, vol. 69, no. 1-2, pp. 79-87, 2012.
 T. Y. Li, X. D. Liu, Z. G. Qin and X. F. Zhang, “Formal Analysis for Security of Otway-Rees Protocol with BAN Logic,” in Proc. 1st International Workshop on Database Technology and Applications, 2009, Wuhan, pp. 590-593.
 T. Y. Li, X. D. Liu, Z. G. Qin and X. F. Zhang, “An improved security protocol formal analysis with BAN logic,” in Proc. International Conference on Electronic Commerce and Business Intelligence, 2009, pp. 102-105.
 X. X. Li, W. D. Qiu, D. Zheng, K. F. Chen and J. H. Li, “Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards,” IEEE Transactions on Industrial Electronics, vol. 57, no. 2, pp. 793-800, 2010.
J. C. Mason and D. C. Handscomb, “Chebyshev polynomials,” Chapman & Hall/CRC, Boca Raton, Florida, 2003.
 R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers,” Communications on The ACM, vol. 21, no. 12, pp. 993-999, 1978.
 L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Physical Review Letters, vol. 64, no. 8, pp. 821-824, 1990.
 L. M. Pecora and T. L. Carroll, “Driving systems with chaotic signals,” Physical Review A, vol. 44, no. 4, pp. 2374-2383, 1991.
 A. D. Santis, G. D. Crescenzo and G. Persiano, “Secret sharing and perfect zero knowledge,” in Advances in Cryptology: CRYPTO’93, 1993, Springer-Verlag, pp. 73-84.
 C. P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
 L. J. Sheu, “A speech encryption using fractional chaotic systems,” Nonlinear Dynamics, vol. 65, no. 1-2, pp. 103-108, 2011.
 G. J. Simmons, “Contemporary Cryptology: The Science of Information Integrity,” IEEE, Inc., New York, 1992.
 R. G. Song, “Advanced smart card based password authentication protocol,” Computer Standards & Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.
 H. B. Tang and X. S. Liu, “Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme,” International Journal of Communication Systems, vol. 25, no. 12, pp. 1639–1644, 2012.
 H. R. Tseng and E. Jou, “An efficient anonymous key agreement protocol based on chaotic maps,” in Proc. IEEE International Conference on High Performance Computing and Communications, 2011, pp. 752-757.
 X. Y. Wang, L. Yang, R. Liu and A. Kadir, “A chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 62, no. 3, pp. 615-621, 2010.
 X. Y. Wang, X. J. Wang, J. F. Zhao and Z. F .Zhang, “Chaotic encryption algorithm based on alternant of stream cipher and block cipher,” Nonlinear Dynamics, vol. 63, no. 4, pp. 587-597, 2011.
 K. W. Wong, “A fast chaotic cryptographic scheme with dynamic look up table,” Physics Letters A, vol. 298, no. 4, pp. 238-242, 2002.
 D. Xiao, X. F. Liao and S. J. Deng, “One-way hash function construction based on the chaotic map with changeable parameter,” Chaos Solitons & Fractals, vol. 24, no. 1, pp. 65-71, 2005.
 D. Xiao, F. Y. Shih and X. F. Liao, “A chaos-based hash function with both modification detection and localization capabilities,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2254-2261, 2010.
 Q. Xie, “A new authenticated key agreement for session initiation protocol,” International Journal of Communication Systems, vol. 25, no. 1, pp. 47–54, 2012.
 J. Xu, W. T. Zhu and D. G. Feng, “An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks,” Journal of Computer Communications, vol. 34, no. 3, pp. 319-325, 2011.
 L. H. Zhang, “Cryptanalysis of the public key encryption based on multiple chaotic systems,” Chaos Solitons & Fractals, vol. 37, no. 3, pp. 669-674, 2008.