CN102916957A - Safe, reliable and low-cost RFID mutual authentication method - Google Patents

Safe, reliable and low-cost RFID mutual authentication method Download PDF

Info

Publication number
CN102916957A
CN102916957A CN2012103909407A CN201210390940A CN102916957A CN 102916957 A CN102916957 A CN 102916957A CN 2012103909407 A CN2012103909407 A CN 2012103909407A CN 201210390940 A CN201210390940 A CN 201210390940A CN 102916957 A CN102916957 A CN 102916957A
Authority
CN
China
Prior art keywords
cur
key
rfid
rfid label
temp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103909407A
Other languages
Chinese (zh)
Other versions
CN102916957B (en
Inventor
王超
李杨
樊秀梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201210390940.7A priority Critical patent/CN102916957B/en
Publication of CN102916957A publication Critical patent/CN102916957A/en
Application granted granted Critical
Publication of CN102916957B publication Critical patent/CN102916957B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safe, reliable and low-cost RFID mutual authentication method, which belongs to the field of wireless network communication technology. The method provided by the invention is an RFID mutual authentication protocol based on a linear feedback shift register, a physical unclonable function and mapping array technology. The method comprises the following steps: performing key authentication after completion of repeated information interaction between a reader and a tag, so as to ensure that only legal reader and tag can realize data reading, and then completing mutual authentication between the RFID tag and the reader. The method is characterized in that the linear shift register is adopted to generate pseudorandom numbers so as to effectively reduce gate circuit numbers; the physical unclonable function is adopted to disguise tag ID information so as to avoid core information leakage; and the mapping array technology is adopted to protect the tag position privacy. The method provided by the invention not only can protect the privacy data of the tags from being stolen by illegal users, but also can effectively defense internal/external malicious system attack by users.

Description

A kind of safe and reliable, RFID mutual authentication method cheaply
Technical field
The present invention relates to the identity identifying technology field, particularly a kind of safe and reliable, RFID mutual authentication method cheaply belongs to the wireless network communication technique field.
Background technology
RFID(Radio Frequency Identification) be a kind of non-contact automatic identification technology, it is automatically identified destination object and obtains related data information by radiofrequency signal.Rfid interrogator sends the radiofrequency signal of certain frequency by transmitting antenna, when the RFID label entered the transmitting antenna working region, label was crossed its built-in transmitting antenna with self information exchange such as coding grade and sent; System's reception antenna receives the carrier signal of sending from label, is sent to read write line through the antenna adjustments device, and read write line carries out the demodulation code to the signal that receives, and then delivers to background data base and carries out relevant treatment; Background data base is judged the legitimacy of this card according to logical operation, make corresponding processing and control for different settings, sends the action of command signal control actuator.Because the high speed legibility now has been widely used in the fields such as logistics, market and parking lot, brings great convenience to the human lives.
The structure of RFID automatic recognition system mainly comprises RFID label, rfid interrogator and background data base as shown in Figure 1.Adopt the mode of wired connection to communicate between rfid interrogator and the background data base, adopt wireless radio-frequency to communicate between RFID label and the rfid interrogator.The RFID label is by inner memory chip stores data.
Communication between RFID label and the rfid interrogator provides flexibility for the system data collection, but meanwhile, data are also leaked cruelly in public, become a large potential safety hazard.Obviously, do not have reliable Information Security Mechanism, just can't effectively protect the data message in the RFID label.If the information in the label is stolen even the malice change, bring the loss that to estimate may for the lawful owner of label.In addition, do not have the RFID label of authentic communication security mechanism, also exist easily and leaks some sensitive informations to contiguous read write line, easily disturbed, the easy potential safety hazard such as tracked.If the fail safe of rfid system can not be fully guaranteed, the personal information in the rfid system, trade secret and military secret all may be stolen by the people or be utilized by the lawless person, and this will have a strong impact on economic security, military security and national security.
At present, the fail safe of rfid system has become the key factor of its extensive use of restriction.Simultaneously, the RFID label itself has the shortcoming of oneself, and for example: storage capacity is limited, and computing capability is limited, and battery-powered time is limited, and these deficiencies are all limiting the design of RFID safety authentication protocol.Therefore, design is efficient, safety, safety authentication protocol cheaply, has become the in the world main development direction of RFID technology.
At present, existing safety authentication protocol mainly contains Hash chain agreement, Hash-Lock agreement, randomized Hash-Lock agreement and LCAP agreement etc.
Wherein, Hash chain agreement is a kind of unilateral authentication agreement, and its shortcoming is: 1. only realized the authentication of rfid interrogator to label, do not realized that the RFID label is to the authentication of read write line; 2. background data base will carry out repeatedly computing in once authenticating, and amount of calculation is quite large.Hash-Lock agreement, randomized Hash-Lock agreement and LCAP agreement are bidirectional identification protocols, and its shortcoming is: 1. the Hash-Lock agreement does not have dynamic I D update mechanism, and key and ID expressly transmit, and this has all seriously influenced Security of the system.2. randomized Hash-Lock agreement does not have forward security, and does not resist the position and follow the tracks of attack.3. the LCAP agreement easily causes the problems such as data between database and the RFID label are asynchronous, therefore subjects to asynchronous attacks.
Summary of the invention
The objective of the invention is the deficiency that exists in order to overcome the existing safety authentication protocol that is applied in the RFID automatic recognition system, propose a kind of safe and reliable, RFID mutual authentication method cheaply, realize that the RFID label is with the two-way authentication of read write line.
The objective of the invention is to be achieved through the following technical solutions.
A kind of safe and reliable, RFID mutual authentication method cheaply, carry out safety certification when being used between RFID automatic recognition system RFID label and the rfid interrogator radio communication, described RFID automatic recognition system comprises RFID label, rfid interrogator and background data base, and it comprises:
(1) embedding linear feedback shift register and physics can not be cloned function (Physical Unclonable Function, PUF) in the RFID label; Wherein, the function of linear feedback shift register is to generate pseudo random number; The function that physics can not be cloned function is to generate and the unique identity code of the Id(of RFID label) corresponding camouflage Id, avoid the plaintext transmission of RFID label Id and key.Embed random number generator and the linear feedback shift register identical with the RFID label in background data base, wherein, the function of random number generator is to generate any random number; The function of the linear feedback shift register in the background data base also is to generate pseudo random number.
(2) the RFID automatic recognition system is carried out initialization, specific as follows:
In each RFID label, be written into four-tuple { Id, a Key CUR, P CUR(Id), Array[m], wherein, Id represents unique identity code of RFID label; Key CURRepresent the key of current sessions, its initial value is any random number; P CUR(Id) represent the current camouflage Id of RFID label, can not clone function by physics and generate, initial value is for can not clone the end value that function obtains to label Id Applied Physics; Array[m] be an array that length is m, it is positive integer that the initial value of this array element is 0, m, m 〉=64.
In background data base, be written into five-tuple { ID, a KEY CUR, P CUR(ID), KEY PRE, P PRE(ID) }.Wherein, unique identity code of the current communication of ID representative RFID label; KEY CURRepresent the current sessions key of current communication RFID label, its initial value is identical with the initial session key of current communication RFID label; P CUR(ID) the current camouflage ID of the current communication of representative RFID label, initial value is identical with the initial camouflage Id of current communication RFID label; KEY PRERepresent the last time session key of current communication RFID label, its initial value is empty; P PRE(ID) the last time camouflage ID of the current communication of representative RFID label, its initial value is empty.
(3) proof procedure between RFID label and the rfid interrogator is specially:
Step 1: random number generator generates a random number (representing with R) in the background data base, and this random number R is sent to rfid interrogator, and rfid interrogator is to extraneous RFID label broadcasting random number R and communication request.
Step 2: after the RFID label is received random number R and communication request from read write line, calculate the value of temporary variable Temp by formula (1); Then check Array[Temp] whether be 1; If Array[Temp]=1, then send refuse information to rfid interrogator, finish current sessions; Otherwise, will Send to rfid interrogator, and Array[Temp be set]=1; Wherein,
Figure BDA00002256529600032
The expression XOR, L () expression acts on parameter in the bracket with the linear shift register function.
Temp=L(R)%m (1)
Wherein, Temp is a temporary variable; % is the complementation symbol.
Step 3:RFID read write line judges whether this message is refuse information, if refuse information then finishes current sessions after receiving the message of RFID label transmission.If not refuse information, then this message is considered as
Figure BDA00002256529600033
Current sessions key K ey according to the current communication of formula (2) reduction RFID label CURThen, in background data base, search and Key CURThe KEY that value equates CURValue if find, then extracts and this KEY CURCorresponding ID and P CUR(ID), and calculate temporary variable Temp ' according to formula (3), then Temp ' is sent to the RFID label; If do not find, then in database, search and Key CURThe KEY that value equates PREValue if find, extracts and this KEY PRECorresponding ID and P PRE(ID), and calculate temporary variable Temp ' according to publicity (4), Temp ' is sent to the RFID label; Otherwise, finish current sessions.
Key CUR = ( ( Key CUR ⊕ L ( R ) ) ⊕ L ( R ) ) - - - ( 2 )
Temp ′ = ( L ( R ) ⊕ ID ) ⊕ P CUR ( ID ) - - - ( 3 )
Wherein, Temp ' is a temporary variable.
Temp ′ = ( L ( R ) ⊕ ID ) ⊕ P PRE ( ID ) - - - ( 4 )
After step 4:RFID label receives Temp ' value, calculate temporary variable Temp by formula (5) ", " compare with Temp ' then with Temp, if equate, assert that then rfid interrogator is legal, the RFID label calculates temporary variable Temp1 according to formula (6), and with Temp1,
Figure BDA00002256529600044
With
Figure BDA00002256529600045
Send to rfid interrogator, wherein, P (Key CUR) represent that physics can not be cloned function acts on Key CUR, P (P CUR(Id)) representing that just physics can not be cloned function acts on P CUR(Id); If unequal, send refuse information to rfid interrogator, finish current sessions.
Temp ′ ′ = ( L ( R ) ⊕ Id ) ⊕ P CUR ( Id ) - - - ( 5 )
Wherein, Temp " is a temporary variable.
Temp 1 = P CUR ( Id ) ⊕ L ( Id ) - - - ( 6 )
Wherein, Temp1 is a temporary variable.
Step 5: judge whether the message that rfid interrogator receives is refuse information, if so, end session then; Otherwise, calculate Temp2 by formula (7); Temp2 and Temp1 are compared, if Temp2 and Temp1 are unequal, assert that then the RFID label is illegal, finish current sessions.Otherwise, assert that the RFID label is legal, upgrade background data base; Renewal to background data base is divided into 2 kinds of situations processing:
Situation 1: as in the step 3, at KEY CURIn find and Key CURThe value that equates is then upgraded KEY PREAnd P PRE(ID), make KEY PRE=KEY CUR, P PRE(ID)=P CUR(ID), then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Situation 2: as in the step 3, at KEY PREIn find and Key CURThe value that equates then keeps KEY PREAnd P PRE(ID) constant, then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Temp 2 = P CUR ( ID ) ⊕ L ( ID ) - - - ( 7 )
Wherein, Temp2 is a temporary variable.
P ( KEY CUR ) = ( L ( P CUR ( Id ) ) ⊕ P ( Key CUR ) ) ⊕ L ( P CUR ( ID ) ) - - - ( 8 )
P ( P CUR ( ID ) ) = ( L ( P ( Key CUR ) ) ⊕ P ( P CUR ( Id ) ) ) ⊕ L ( P ( KEY CUR ) ) - - - ( 9 )
Step 6:RFID read write line sends and is updated successfully message and KEY CURGive the RFID label.
Step 7:RFID label receives updating message, with Key CURValue be updated to P (Key CUR), with P CUR(Id) value is updated to P (P CUR(Id)); Then array Array[m in the label resets] in each element value be 0, finish the RFID tag update, by checking.
By the operation of above-mentioned steps, finish the proof procedure between RFID label and the rfid interrogator, can carry out subsequent communications by RFID label and the rfid interrogator of verifying.
Beneficial effect
That the present invention proposes is a kind of safe and reliable, the RFID mutual authentication method is compared with existing RFID authentication method cheaply, has following advantage:
1. has dynamic I D update mechanism.RFID label and database whenever are successfully completed after the session, and camouflage ID and key all once upgrade, and can avoid the replay attack of malice.
2. avoid the plaintext of data to transmit, strengthened Security of the system.The present invention has used physics can not clone function.The correlation properties of the integrated circuit of this functional dependence generate random number, and ID pretends to label, and any method all can't clone identical label and copy the purpose that generates random number to reach.
3. has forward security.The present invention has used linear feedback shift register.Linear feedback shift register is good pseudorandom number generator, and after seed number of input, the numeral of generation has good randomness; Simultaneously, the circuit cost of linear feedback shift register is very low, for 128 key, only need 268 gate circuits, therefore, it is suitable for cheaply in the RFID label, can prevent that also the assailant from according to current the transmission of data, extrapolating historical data, therefore have forward security
4. resist the position and follow the tracks of attack.The present invention has adopted mapping array technology, this kind technology can record this and take turns all random numbers that read write line adopts in the communication, because in same the wheel, database adopts the probability of same random number extremely little, so the communication that the random number that label only accepts not to be used is brought.Therefore, this kind technology can effectively be resisted the position tracking of outer bound pair label.
Description of drawings
Fig. 1 is the structural representation of RFID automatic recognition system in the prior art;
Fig. 2 is RFID label in the specific embodiment of the invention and the proof procedure schematic diagram between the rfid interrogator.
Embodiment
Below in conjunction with the accompanying drawing embodiment that develops simultaneously, describe the present invention.
A kind of safe and reliable, RFID mutual authentication method cheaply, carry out safety certification when being used between RFID automatic recognition system RFID label and the rfid interrogator radio communication, described RFID automatic recognition system comprises RFID label, rfid interrogator and background data base, and it comprises:
(1) embedding linear feedback shift register and physics can not be cloned function (Physical Unclonable Function, PUF) in the RFID label; Wherein, the function of linear feedback shift register is to generate pseudo random number; The function that physics can not be cloned function is to generate the camouflage Id corresponding with the Id of RFID label, avoids the plaintext transmission of RFID label Id and key.Embed random number generator and the linear feedback shift register identical with the RFID label in background data base, wherein, the function of random number generator is to generate any random number; The function of the linear feedback shift register in the background data base also is to generate pseudo random number.
(2) the RFID automatic recognition system is carried out initialization, specific as follows:
In each RFID label, be written into four-tuple { Id, a Key CUR, P CUR(Id), Array[m], wherein, Id represents unique identity code of RFID label; Key CURRepresent the key of current sessions, its initial value is any random number, and it is the binary number of 64 of length that this random number is set; P CUR(Id) represent the current camouflage Id of RFID label, can not clone function by physics and generate, initial value is for can not clone the end value that function obtains to label Id Applied Physics, and the length of this numerical value also is 64 binary number; Array[m] be an array that length is m, the initial value of this array element is 0, m=64.
In background data base, be written into five-tuple { ID, a KEY CUR, P CUR(ID), KEY PRE, P PRE(ID) }.Wherein, unique identity code of the current communication of ID representative RFID label; KEY CURRepresent the current sessions key of current communication RFID label, its initial value is identical with the initial session key of current communication RFID label; P CUR(ID) the current camouflage ID of the current communication of representative RFID label, initial value is identical with the initial camouflage Id of current communication RFID label; KEY PRERepresent the last time session key of current communication RFID label, its initial value is empty; P PRE(ID) the last time camouflage ID of the current communication of representative RFID label, its initial value is empty.
(3) the proof procedure schematic diagram between RFID label and the rfid interrogator as shown in Figure 2, concrete proof procedure is:
Step 1: random number generator generates a random number R in the background data base, and this random number R is sent to rfid interrogator, and rfid interrogator is to extraneous RFID label broadcasting random number R and communication request.
Step 2: after the RFID label is received random number R and communication request from read write line, calculate the value of temporary variable Temp by formula (1); Then check Array[Temp] whether be 1; If Array[Temp]=1, then send refuse information to rfid interrogator, finish current sessions; Otherwise, will Send to rfid interrogator, and Array[Temp be set]=1.For example: when m=64, L (R)=1010101010, then Temp=(101010) 2=(42) 10, check Array[42] whether be 1; Wherein, () 2The expression binary numeral, () 10Expression decimal system numerical value.
Step 3:RFID read write line judges whether this message is refuse information, if refuse information then finishes current sessions after receiving the message of RFID label transmission.If not refuse information, then this message is considered as
Figure BDA00002256529600072
Current sessions key K ey according to the current communication of formula (2) reduction RFID label CURThen, in background data base, search and Key CURThe KEY that value equates CURValue if find, then extracts and this KEY CURCorresponding ID and P CUR(ID), and calculate temporary variable Temp ' according to formula (3), then Temp ' is sent to the RFID label; If do not find, then in database, search and Key CURThe KEY that value equates PREValue if find, extracts and this KEY PRECorresponding ID and P PRE(ID), and calculate temporary variable Temp ' according to publicity (4), Temp ' is sent to the RFID label; Otherwise, finish current sessions.
After step 4:RFID label receives Temp ' value, calculate temporary variable Temp by formula (5) ", " compare with Temp ' then with Temp, if equate, assert that then rfid interrogator is legal, the RFID label calculates temporary variable Temp1 according to formula (6), and with Temp1,
Figure BDA00002256529600073
With Send to rfid interrogator, wherein, P (Key CUR) represent that physics can not be cloned function acts on Key CUR, P (P CUR(Id)) representing that just physics can not be cloned function acts on P CUR(Id); If unequal, send refuse information to rfid interrogator, finish current sessions.
Step 5: judge whether the message that rfid interrogator receives is refuse information, if so, end session then; Otherwise, calculate Temp2 by formula (7); Temp2 and Temp1 are compared, if Temp2 and Temp1 are unequal, assert that then the RFID label is illegal, finish current sessions.Otherwise, assert that the RFID label is legal, upgrade background data base; Renewal to background data base is divided into 2 kinds of situations processing:
Situation 1: as in the step 3, at KEY CURIn find and Key CURThe value that equates is then upgraded KEY PREAnd P PRE(ID), make KEY PRE=KEY CUR, P PRE(ID)=P CUR(ID); Then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Situation 2: as in the step 3, at KEY PREIn find and Key CURThe value that equates then keeps KEY PREAnd P PRE(ID) constant, then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Step 6:RFID read write line sends and is updated successfully message and KEY CURGive the RFID label.
Step 7:RFID label receives updating message, with Key CURValue be updated to P (Key CUR), with P CUR(Id) value is updated to P (P CUR(Id)); Then array Array[m in the label resets] in each element value be 0, finish the RFID tag update, by checking.
By the operation of above-mentioned steps, finish the proof procedure between RFID label and the rfid interrogator, can carry out subsequent communications by RFID label and the rfid interrogator of verifying.
Above-described specific descriptions; purpose, technical scheme and beneficial effect to invention further describe; institute is understood that; the above only is specific embodiments of the invention; be used for explaining the present invention, the protection range that is not intended to limit the present invention, within the spirit and principles in the present invention all; any modification of making, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (1)

1. safe and reliable, RFID mutual authentication method cheaply carries out safety certification when being used between RFID automatic recognition system RFID label and the rfid interrogator radio communication; Described RFID automatic recognition system comprises RFID label, rfid interrogator and background data base; Described RFID mutual authentication method is characterized in that: comprising:
(1) embedding linear feedback shift register and physics can not be cloned function in the RFID label; Wherein, the function of linear feedback shift register is to generate pseudo random number; The function that physics can not be cloned function is to generate the camouflage Id corresponding with unique identity code Id of RFID label, avoids the plaintext transmission of RFID label Id and key; Embed random number generator and the linear feedback shift register identical with the RFID label in background data base, wherein, the function of random number generator is to generate any random number; The function of the linear feedback shift register in the background data base also is to generate pseudo random number;
(2) the RFID automatic recognition system is carried out initialization, specific as follows:
In each RFID label, be written into four-tuple { Id, a Key CUR, P CUR(Id), Array[m], wherein, Id represents unique identity code of RFID label; Key CURRepresent the key of current sessions, its initial value is any random number; P CUR(Id) represent the current camouflage Id of RFID label, can not clone function by physics and generate, initial value is for can not clone the end value that function obtains to label Id Applied Physics; Array[m] be an array that length is m, it is positive integer that the initial value of this array element is 0, m, m 〉=64;
In background data base, be written into five-tuple { ID, a KEY CUR, P CUR(ID), KEY PRE, P PRE(ID) }; Wherein, unique identity code of the current communication of ID representative RFID label; KEY CURRepresent the current sessions key of current communication RFID label, its initial value is identical with the initial session key of current communication RFID label; P CUR(ID) the current camouflage ID of the current communication of representative RFID label, initial value is identical with the initial camouflage Id of current communication RFID label; KEY PRERepresent the last time session key of current communication RFID label, its initial value is empty; P PRE(ID) the last time camouflage ID of the current communication of representative RFID label, its initial value is empty;
(3) proof procedure between RFID label and the rfid interrogator is specially:
Step 1: random number generator generates a random number R in the background data base, and this random number R is sent to rfid interrogator, and rfid interrogator is to extraneous RFID label broadcasting random number R and communication request;
Step 2: after the RFID label is received random number R and communication request from read write line, calculate the value of temporary variable Temp by formula (1); Then check Array[Temp] whether be 1; If Array[Temp]=1, then send refuse information to rfid interrogator, finish current sessions; Otherwise, will
Figure FDA00002256529500011
Send to rfid interrogator, and Array[Temp be set]=1; Wherein,
Figure FDA00002256529500012
The expression XOR, L () expression acts on parameter in the bracket with the linear shift register function;
Temp=L(R)%m (1)
Wherein, Temp is a temporary variable; % is the complementation symbol;
Step 3:RFID read write line judges whether this message is refuse information, if refuse information then finishes current sessions after receiving the message of RFID label transmission; If not refuse information, then this message is considered as
Figure FDA00002256529500021
Current sessions key K ey according to the current communication of formula (2) reduction RFID label CURThen, in background data base, search and Key CURThe KEY that value equates CURValue if find, then extracts and this KEY CURCorresponding ID and P CUR(ID), and calculate temporary variable Temp ' according to formula (3), then Temp ' is sent to the RFID label; If do not find, then in database, search and Key CURThe KEY that value equates PREValue if find, extracts and this KEY PRECorresponding ID and P PRE(ID), and calculate temporary variable Temp ' according to publicity (4), Temp ' is sent to the RFID label; Otherwise, finish current sessions;
Key CUR = ( ( Key CUR ⊕ L ( R ) ) ⊕ L ( R ) ) - - - ( 2 )
Temp ′ = ( L ( R ) ⊕ ID ) ⊕ P CUR ( ID ) - - - ( 3 )
Wherein, Temp ' is a temporary variable;
Temp ′ = ( L ( R ) ⊕ ID ) ⊕ P PRE ( ID ) - - - ( 4 )
After step 4:RFID label receives Temp ' value, calculate temporary variable Temp by formula (5) ", " compare with Temp ' then with Temp, if equate, assert that then rfid interrogator is legal, the RFID label calculates temporary variable Temp1 according to formula (6), and with Temp1,
Figure FDA00002256529500025
With
Figure FDA00002256529500026
Send to rfid interrogator, wherein, P (Key CUR) represent that physics can not be cloned function acts on Key CUR, P (P CUR(Id)) representing that just physics can not be cloned function acts on P CUR(Id); If unequal, send refuse information to rfid interrogator, finish current sessions;
Temp ′ ′ = ( L ( R ) ⊕ Id ) ⊕ P CUR ( Id ) - - - ( 5 )
Wherein, Temp " is a temporary variable;
Temp 1 = P CUR ( Id ) ⊕ L ( Id ) - - - ( 6 )
Wherein, Temp1 is a temporary variable;
Step 5: judge whether the message that rfid interrogator receives is refuse information, if so, end session then; Otherwise, calculate Temp2 by formula (7); Temp2 and Temp1 are compared, if Temp2 and Temp1 are unequal, assert that then the RFID label is illegal, finish current sessions; Otherwise, assert that the RFID label is legal, upgrade background data base; Renewal to background data base is divided into 2 kinds of situations processing:
Situation 1: as in the step 3, at KEY CURIn find and Key CURThe value that equates is then upgraded KEY PREAnd P PRE(ID), make KEY PRE=KEY CUR, P PRE(ID)=P CUR(ID), then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Situation 2: as in the step 3, at KEY PREIn find and Key CURThe value that equates then keeps KEY PREAnd P PRE(ID) constant, then recover P (KEY by formula (8) and formula (9) CUR) and P (P CUR(ID)), with KEY CURValue be updated to P (KEY CUR), with P CUR(ID) value is updated to P (P CUR(ID));
Temp 2 = P CUR ( ID ) ⊕ L ( ID ) - - - ( 7 )
Wherein, Temp2 is a temporary variable;
P ( KEY CUR ) = ( L ( P CUR ( Id ) ) ⊕ P ( Key CUR ) ) ⊕ L ( P CUR ( ID ) ) - - - ( 8 )
P ( P CUR ( ID ) ) = ( L ( P ( Key CUR ) ) ⊕ P ( P CUR ( Id ) ) ) ⊕ L ( P ( KEY CUR ) ) - - - ( 9 )
Step 6:RFID read write line sends and is updated successfully message and KEY CURGive the RFID label;
Step 7:RFID label receives updating message, with Key CURValue be updated to P (Key CUR), with P CUR(Id) value is updated to P (P CUR(Id)); Then array Array[m in the label resets] in each element value be 0, finish the RFID tag update, by checking;
By the operation of above-mentioned steps, finish the proof procedure between RFID label and the rfid interrogator, can carry out subsequent communications by RFID label and the rfid interrogator of verifying.
CN201210390940.7A 2012-10-15 2012-10-15 Safe, reliable and low-cost RFID mutual authentication method Expired - Fee Related CN102916957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210390940.7A CN102916957B (en) 2012-10-15 2012-10-15 Safe, reliable and low-cost RFID mutual authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210390940.7A CN102916957B (en) 2012-10-15 2012-10-15 Safe, reliable and low-cost RFID mutual authentication method

Publications (2)

Publication Number Publication Date
CN102916957A true CN102916957A (en) 2013-02-06
CN102916957B CN102916957B (en) 2015-03-11

Family

ID=47615191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210390940.7A Expired - Fee Related CN102916957B (en) 2012-10-15 2012-10-15 Safe, reliable and low-cost RFID mutual authentication method

Country Status (1)

Country Link
CN (1) CN102916957B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246903A (en) * 2013-05-10 2013-08-14 智坤(江苏)半导体有限公司 Method for enhancing radio-frequency identification information safety and privacy protection
CN103345690A (en) * 2013-07-19 2013-10-09 中山大学 Anti-fake method based on RFID and physical unclonable function
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN104333537A (en) * 2014-10-22 2015-02-04 浙江中烟工业有限责任公司 RFID security authentication method based on physical unclonable function
CN105357015A (en) * 2015-12-02 2016-02-24 华北电力大学(保定) Internet of things (IOT) security authentication method
CN105791317A (en) * 2016-04-29 2016-07-20 广东工业大学 RFID system secret-key wireless generation method
CN105959101A (en) * 2016-06-29 2016-09-21 广东工业大学 Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
CN108173662A (en) * 2018-02-12 2018-06-15 海信集团有限公司 The authentication method and device of a kind of equipment
CN109040853A (en) * 2018-09-04 2018-12-18 国微集团(深圳)有限公司 A kind of digital stream media fingerprints watermark protection method and device
CN109245904A (en) * 2018-10-17 2019-01-18 南京航空航天大学 A kind of lightweight car networking system safety certifying method based on PUF
CN109756323A (en) * 2017-11-01 2019-05-14 中国电信股份有限公司 Lightweight safety certifying method and system, transmitting terminal and receiving end
CN110324151A (en) * 2019-06-25 2019-10-11 北京智涵芯宇科技有限公司 Safety chip and application method, system and medium based on PUF and zero-knowledge proof
CN110677254A (en) * 2019-09-20 2020-01-10 广州城市职业学院 Ultra-lightweight RFID authentication method
CN111033406A (en) * 2017-09-08 2020-04-17 日本电产株式会社 Management system for conveyed object and information processing device
CN115660021A (en) * 2022-12-29 2023-01-31 成都普什信息自动化有限公司 RFID anti-counterfeiting bidirectional authentication reading method and RFID anti-counterfeiting system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070052525A1 (en) * 2005-03-11 2007-03-08 Chenghao Quan RFID system and method for protecting information
CN101783732A (en) * 2010-03-12 2010-07-21 西安西电捷通无线网络通信股份有限公司 Offline mutual authentication method and system based on pre-shared key
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070052525A1 (en) * 2005-03-11 2007-03-08 Chenghao Quan RFID system and method for protecting information
CN101783732A (en) * 2010-03-12 2010-07-21 西安西电捷通无线网络通信股份有限公司 Offline mutual authentication method and system based on pre-shared key
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246903A (en) * 2013-05-10 2013-08-14 智坤(江苏)半导体有限公司 Method for enhancing radio-frequency identification information safety and privacy protection
CN103345690A (en) * 2013-07-19 2013-10-09 中山大学 Anti-fake method based on RFID and physical unclonable function
CN103345690B (en) * 2013-07-19 2019-12-24 中山大学 Anti-counterfeiting method based on RFID and physical unclonable function
CN103905202B (en) * 2014-03-28 2017-07-11 广东工业大学 A kind of RFID lightweight mutual authentication methods based on PUF
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN104333537A (en) * 2014-10-22 2015-02-04 浙江中烟工业有限责任公司 RFID security authentication method based on physical unclonable function
CN105357015A (en) * 2015-12-02 2016-02-24 华北电力大学(保定) Internet of things (IOT) security authentication method
CN105357015B (en) * 2015-12-02 2018-11-30 华北电力大学(保定) A kind of Internet of Things safety certifying method
CN105791317B (en) * 2016-04-29 2018-12-18 广东工业大学 A kind of method that RFID system key wirelessly generates
CN105791317A (en) * 2016-04-29 2016-07-20 广东工业大学 RFID system secret-key wireless generation method
CN105959101A (en) * 2016-06-29 2016-09-21 广东工业大学 Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
CN105959101B (en) * 2016-06-29 2019-08-13 广东工业大学 A method of RFID two-way authentication is realized using the unclonable technology of physics
CN111033406A (en) * 2017-09-08 2020-04-17 日本电产株式会社 Management system for conveyed object and information processing device
CN109756323A (en) * 2017-11-01 2019-05-14 中国电信股份有限公司 Lightweight safety certifying method and system, transmitting terminal and receiving end
CN109756323B (en) * 2017-11-01 2021-09-14 中国电信股份有限公司 Lightweight security authentication method and system, sending end and receiving end
CN108173662A (en) * 2018-02-12 2018-06-15 海信集团有限公司 The authentication method and device of a kind of equipment
CN108173662B (en) * 2018-02-12 2019-12-24 海信集团有限公司 Equipment authentication method and device
CN109040853A (en) * 2018-09-04 2018-12-18 国微集团(深圳)有限公司 A kind of digital stream media fingerprints watermark protection method and device
CN109245904A (en) * 2018-10-17 2019-01-18 南京航空航天大学 A kind of lightweight car networking system safety certifying method based on PUF
CN110324151A (en) * 2019-06-25 2019-10-11 北京智涵芯宇科技有限公司 Safety chip and application method, system and medium based on PUF and zero-knowledge proof
CN110324151B (en) * 2019-06-25 2021-12-31 北京智涵芯宇科技有限公司 PUF (physical unclonable function) and zero knowledge proof based security chip, application method, system and medium
CN110677254A (en) * 2019-09-20 2020-01-10 广州城市职业学院 Ultra-lightweight RFID authentication method
CN110677254B (en) * 2019-09-20 2022-06-10 广州城市职业学院 Ultra-lightweight RFID authentication method
CN115660021A (en) * 2022-12-29 2023-01-31 成都普什信息自动化有限公司 RFID anti-counterfeiting bidirectional authentication reading method and RFID anti-counterfeiting system

Also Published As

Publication number Publication date
CN102916957B (en) 2015-03-11

Similar Documents

Publication Publication Date Title
CN102916957B (en) Safe, reliable and low-cost RFID mutual authentication method
CN102916956A (en) Hash function based RFID (Radio Frequency IDentification) mutual authentication method
CN103020671B (en) A kind of radio frequency identification mutual authentication method based on hash function
CN105450673B (en) Security protocol verification method based on mobile RFID system
CN104184733B (en) A kind of RFID lightweight mutual authentication methods encoded based on CRC
US20180196973A1 (en) Security Certification Method for Hiding Ultra-High Frequency Electronic Tag Identifier
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN104885091A (en) RFID tag and method for operating RFID tag
CN105354604A (en) Effective novel anti-counterfeiting method based on physical unclonable function
CN102682311B (en) Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
CN103413109A (en) Bidirectional authentication method of radio frequency identification system
CN101976363B (en) Hash function based RFID (Radio Frequency Identification Devices) authentication method
CN101719830A (en) Method and system of NFC authentication
CN103532718A (en) Authentication method and authentication system
Nagashree et al. Near field communication
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN101794402B (en) Wireless ultrahigh-frequency radio-frequency identification system and method thereof for resisting invalid quantity statistical attack
CN110276423A (en) A kind of RFID Verification System for chip finger print of high encryption
CN104579688A (en) RFID two-way authentication method based on Hash function and capable of updating keys synchronously
Kim et al. MARP: Mobile agent for RFID privacy protection
CN106027237A (en) Group based key array security authentication protocol in RFID (Radio Frequency Identification) system
CN108694344A (en) A kind of cryptography electronic label
CN103840941A (en) Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication
CN103763106A (en) Position privacy protection method in Internet-of-Things authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150311

Termination date: 20161015