{"title":"基于混沌认证加密方案的密钥协商协议","authors":"Ta Thi Kim Hue, N. X. Quyen, T. Hoang","doi":"10.1109/ICCE55644.2022.9852057","DOIUrl":null,"url":null,"abstract":"This paper proposes a shared secret key exchange based on a lightweight chaotic authenticated encryption. The Standard map is utilized for a keyed-hash function and the hash function is used to construct an Encrypt-then-MAC using the counter mode of the lightweight block cipher. Then, the Chebyshev polynomial is employed for the public key encryption in the key agreement scheme. Security analysis shows the results that the integration of the two chaotic maps enhances confidentiality, integrity, and authentication for the key agreement protocol. Hardware design of the proposed authenticated encryption scheme with the Lightweight Counter Mode shows that it is suitable for embedded systems due to low resource utilization.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Key Agreement Protocol Based on Chaotic Authenticated Encryption Scheme\",\"authors\":\"Ta Thi Kim Hue, N. X. Quyen, T. Hoang\",\"doi\":\"10.1109/ICCE55644.2022.9852057\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a shared secret key exchange based on a lightweight chaotic authenticated encryption. The Standard map is utilized for a keyed-hash function and the hash function is used to construct an Encrypt-then-MAC using the counter mode of the lightweight block cipher. Then, the Chebyshev polynomial is employed for the public key encryption in the key agreement scheme. Security analysis shows the results that the integration of the two chaotic maps enhances confidentiality, integrity, and authentication for the key agreement protocol. Hardware design of the proposed authenticated encryption scheme with the Lightweight Counter Mode shows that it is suitable for embedded systems due to low resource utilization.\",\"PeriodicalId\":388547,\"journal\":{\"name\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE55644.2022.9852057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE55644.2022.9852057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key Agreement Protocol Based on Chaotic Authenticated Encryption Scheme
This paper proposes a shared secret key exchange based on a lightweight chaotic authenticated encryption. The Standard map is utilized for a keyed-hash function and the hash function is used to construct an Encrypt-then-MAC using the counter mode of the lightweight block cipher. Then, the Chebyshev polynomial is employed for the public key encryption in the key agreement scheme. Security analysis shows the results that the integration of the two chaotic maps enhances confidentiality, integrity, and authentication for the key agreement protocol. Hardware design of the proposed authenticated encryption scheme with the Lightweight Counter Mode shows that it is suitable for embedded systems due to low resource utilization.