Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards

Wei Chuen Yau, Raphael C.W. Phan

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)


Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow communication parties to exchange session keys in an authentic and secure manner. Guo and Chang recently proposed a novel password-authenticated key agreement protocol using smart card based on chaotic maps. They claimed that the protocol achieves the security goal of mutual authentication, as well as other essential security requirements. In this paper, we show that this protocol is susceptible to key-compromise impersonation and parallel session attacks. We also identify two weaknesses in the password change phase of the protocol that leads to authentication with old password and denial of service, respectively.

Original languageEnglish
Pages (from-to)809-821
Number of pages13
JournalNonlinear Dynamics
Issue number2
Publication statusPublished - Jan 2014
Externally publishedYes


  • Authentication
  • Chaotic maps
  • Chebyshev polynomials
  • Security

Cite this