Summary: | 碩士 === 輔仁大學 === 圖書資訊學系碩士班 === 101 === Due to the rapid development and growth of computer network, many people use email or messenger software to communicate with each other through the public network. Nevertheless, the computer network is an insecure shared platform since it may vulnerable to some security attacks such as eavesdropping, password guessing attack, and impersonation attack. Therefore, how to design a secure communication protocol that users can securely communicate with each other becomes an important issue. Over the past few decades, many researchers have been proposed to provide a secure computer network environment, such as remote user authentication protocol using smart cards, three-party password-based authenticated key exchange protocol, and key agreement protocol in multi-server environments. These protocols provide user authentication or key agreement to guarantee the information security that users can authenticate with each other and securely exchange messages over a public network by using the shared session key to encrypt and decrypt the secure information.
In this study, we will analyze three user authentication and key agreement protocols and point out the security flaws of their protocols. Besides, we also propose our protocols based on extended chaotic maps to remedy these security weaknesses of their protocols. As compared with their protocols, the security and performance analysis show that our proposed protocols are more secure and efficient than theirs.
|