{"title":"Analysis and Improvement of an Efficient and Secure Key Agreement Protocol","authors":"Jiyun Yang, Rui Zhang, D. Xiao","doi":"10.1109/CIS.2013.117","DOIUrl":null,"url":null,"abstract":"Improperly chosen parameters will lead to short period distribution of sequences generated by Chebyshev maps over finite fields ZN. However, in a key agreement protocol proposed by Yoon, et al. there is no consideration given to the avoidance of short period distribution. Based on the theory of period distribution the protocol is broken with other information gained from the key establishment process. In this paper, the protocol of Yoon, et al. is broken and improved by getting rid of unnecessary information and encrypting sensitive information, which makes the protocol more secure.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2013.117","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Improperly chosen parameters will lead to short period distribution of sequences generated by Chebyshev maps over finite fields ZN. However, in a key agreement protocol proposed by Yoon, et al. there is no consideration given to the avoidance of short period distribution. Based on the theory of period distribution the protocol is broken with other information gained from the key establishment process. In this paper, the protocol of Yoon, et al. is broken and improved by getting rid of unnecessary information and encrypting sensitive information, which makes the protocol more secure.