首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于字合成运算的射频识别双向认证协议
引用本文:占善华,黄少荣.一种基于字合成运算的射频识别双向认证协议[J].电信科学,2018,34(12):65-70.
作者姓名:占善华  黄少荣
作者单位:1. 广东司法警官职业学院信息管理系,广东 广州 510006;2. 广东工业大学计算机学院,广东 广州 510006
基金项目:国家自然科学基金资助项目(61672171);国家自然科学基金资助项目(61772141);广东省教育厅重大科研项目(2016KZDXM052);广东司法警官职业学院第三届院级课题(2017YB007)
摘    要:RFID系统由标签、读写器、后台数据库3部分组成,其中标签与读写器之间通过无线信道进行信息传输,存在易被攻击者截获通信信息的风险。提出一种基于字合成运算的射频识别双向认证协议。所提协议运用二次剩余定理对信息进行加密,增大破解难度;每轮通信加密过程中,随机数的添加使得前后通信消息均不一致,致使攻击者无法发起追踪攻击行为信消息加密过程中,同时采用字合成运算方法,能够有效减少RFID系统总的计算量;后台数据库端引入随机数校验机制,使系统能够有效抵抗异步攻击等攻击。安全性分析表明,基于字合成运算的射频识别双向认证协议具备较高的安全性;性能分析表明,协议具备轻行为量级计算量的标准。

关 键 词:射频识别  随机数  字合成运算  二次剩余定理  

A bidirectional authentication protocol for RFID based on Syn
Shanhua ZHAN,Shaorong HUANG.A bidirectional authentication protocol for RFID based on Syn[J].Telecommunications Science,2018,34(12):65-70.
Authors:Shanhua ZHAN  Shaorong HUANG
Affiliation:1. Department of Information Management,Guangdong Justice Police Vocational College,Guangzhou 510006,China;2. School of Computer Science and Technology,Guangdong University of Technology,Guangzhou 510006,China
Abstract:The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.
Keywords:RFID  random number  Syn  quadratic residual theorem  
点击此处可从《电信科学》浏览原始摘要信息
点击此处可从《电信科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号