2019
DOI: 10.1080/1206212x.2019.1682238
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and application of Chebyshev Chaotic map in the authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Á , for an exponent of Lyapunov i.e. lnn > 0 [45] Dharminder et al [13] improved the authentication protocol using Chebyshev chaotic-map to prevent the security weakness demonstrated by the existing protocols [26,30]. To reinforce the security strategies, the Nergamo et al extended the Chebyshev polynomial to satisfy the properties of semi-group and commutative i.e.…”
Section: Mathematical Assumption Of Chebyshev Chaotic-mapmentioning
confidence: 99%
“…Á , for an exponent of Lyapunov i.e. lnn > 0 [45] Dharminder et al [13] improved the authentication protocol using Chebyshev chaotic-map to prevent the security weakness demonstrated by the existing protocols [26,30]. To reinforce the security strategies, the Nergamo et al extended the Chebyshev polynomial to satisfy the properties of semi-group and commutative i.e.…”
Section: Mathematical Assumption Of Chebyshev Chaotic-mapmentioning
confidence: 99%
“…All the schemes related to telecare medicine services highly depend on operations which requires low computation and limited storage. Both efficiency and performance has been compared to the related protocols in Table 4, whereas the cost of each operation is computed via running the experiment on intel Pentium − 4 processor with 1024 MB ram as in [5,34] along with computation cost illustrated in Figure 7.…”
Section: Schemesmentioning
confidence: 99%
“…In the same year 2018, Zhang et al [ 25 ] introduced a lightweight and secure authentication protocol for the mobile devices used in heath care telemedicine services, but it is also susceptible to identity guess, password guess and replay attacks. In 2018, Madhusudhan et al [ 20 ] designed an efficient, and secure, and robust protocol for telecare services, but Dharminder et al [ 35 ] discussed the security of the protocol [ 20 ] and they found it susceptible to identity guess, password guess, impersonations, and stolen smart card. In the same year 2020, Dharminder et al [ 34 ] introduced a new design for authentication scheme based on RSA, but it uses the modulo operations that decreases the efficiency of the protocol due to costly modulo exponentiation.…”
Section: Introductionmentioning
confidence: 99%
“…In the Tables 1 , 2 one can see that existing protocols in the TMIS environment suffers various vulnerabilities such as password-guess, identity-guess, impersonations, replaying of older messages, and stolen smart card attacks. In the proposed design, we have discussed two important components security and privacy in the form of security attributes such as identity guess, impersonations, password guess, anonymity, replaying of messages, and stolen smart card information in the protocols [ 1 , 20 , 25 , 35 ] respectively. In the design [ 35 ], we have analyzed that a user selects , and calculates , then he sends to the server.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation