Article ID Journal Published Year Pages File Type
1890396 Chaos, Solitons & Fractals 2009 4 Pages PDF
Abstract

Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.’s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

Related Topics
Physical Sciences and Engineering Physics and Astronomy Statistical and Nonlinear Physics
Authors
, , ,