CN103699863B - A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method - Google Patents

A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method Download PDF

Info

Publication number
CN103699863B
CN103699863B CN201310654793.4A CN201310654793A CN103699863B CN 103699863 B CN103699863 B CN 103699863B CN 201310654793 A CN201310654793 A CN 201310654793A CN 103699863 B CN103699863 B CN 103699863B
Authority
CN
China
Prior art keywords
new
ids
data
label
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310654793.4A
Other languages
Chinese (zh)
Other versions
CN103699863A (en
Inventor
凌捷
沈金伟
邓小丹
叶盛元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU JN UNION TECHNOLOGY Co Ltd
Guangdong University of Technology
Original Assignee
GUANGZHOU JN UNION TECHNOLOGY Co Ltd
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU JN UNION TECHNOLOGY Co Ltd, Guangdong University of Technology filed Critical GUANGZHOU JN UNION TECHNOLOGY Co Ltd
Priority to CN201310654793.4A priority Critical patent/CN103699863B/en
Publication of CN103699863A publication Critical patent/CN103699863A/en
Application granted granted Critical
Publication of CN103699863B publication Critical patent/CN103699863B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, label is additionally arranged session key NtAs flag bit, the random number that this flag bit produces to reader in last time verification process is relevant, and keeps dynamic refresh, and the message making assailant reset lost efficacy, it is possible to the effectively problem of the resisting asynchronous attack of solution;Have employed mutual authentication method to realize the certification of identity, and (x, y) carrys out the message in coded communication, improves the confidentiality that radio frequency identification system communicates in open environment, safer to introduce the nonlinear function NLMC of extra lightweight.The composite can be widely applied to radio frequency identification field.

Description

A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method
Technical field
The present invention relates to radio frequency identification field, especially a kind of asynchronous attack resistant ultra-lightweight radio frequency identification Authentication method.
Background technology
In prior art, radio frequency identification (RFID, Radio Frequency Identification) be numerous from The one of dynamic identification technology, its ultimate principle is to utilize radiofrequency signal and Space Coupling (inductance or electromagnetic coupled) transmission characteristic, Realize the automatic identification to identified object.Based on the advantage that RFID is numerous, RFID obtained quite varied application and Receive more and more attention.
Existing extra lightweight radio frequency identification authentication method based on XOR is low to the requirement of hardware, its label Not having the ability producing pseudo random number, but the defect of this authentication method is, when assailant eavesdrop and reset message time, service Device end is difficult to verify the legitimacy of this message, so that illegal label certification is passed through, causes the data of server end and tab end Update asynchronous, the problem causing asynchronous attacks.
Summary of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to: the super of the high and anti-asynchronous attacks of a kind of safety is provided Lightweight radio frequency identification authentication method.
The technical solution adopted for the present invention to solve the technical problems is: the extra lightweight of a kind of anti-asynchronous attacks is wireless to be penetrated Frequently identification authentication method, including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC(x, y) nonlinear function computing, ROT(x, y) B=(K1 K is obtained after functional operation and XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B | | N1 is transmitted to background server;Described K1 *=ROT(K1⊕Nm,K1), K2 *=ROT(K2⊕Nm,K2), Nm=NLMC (Nt,N1);Its In, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent and disappear The encryption key of breath, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | B | | in N1 The data of IDS data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then perform Step S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with IDS data Corresponding K1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication Label failure, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2Close with session Key NtIt is updated, and through NLMC(x, y) nonlinear function computing, ROT(x, y) sent out after functional operation and XOR Give data C and the D of label;
S6, label go out data N from the extracting data received2', and through NLMC(x, y) nonlinear function computing, ROT (x y) obtains data D ' after functional operation and XOR, then judges label pair according to data D are the most equal with data D ' Whether reader is proved to be successful.
Further, described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old Label assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC(x, y) nonlinear function computing, ROT(x, y) functional operation and XOR, from And obtain being sent to data C of label and D.
Further, described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt newMeter Calculation formula is as follows:
Wherein, ID represents the identity indications of label.
Further, in described step C53, the computing formula of described data C is: C=ROT(K1⊕K2, Nm ') and N2;Institute The computing formula stating data D is: D=(K2*+ Nx) ((K1 K2) ∨ K1*).
Further, described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC(N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2With Data NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein, IDSnew=(IDS+ID) (Nm '+K1 *), K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
Further, by IDS in described step S52new、K1 new、K2 newAnd Nt newThe step for of storage to background server, its Particularly as follows:
Judge the IDS calculatednewThe most identical with arbitrary IDS data of background server storage, the most again give birth to Become random number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newDeposit Storage is to background server.
The invention has the beneficial effects as follows: be additionally arranged session key N in the labeltAs flag bit, this flag bit and last time The random number that in verification process, reader produces is correlated with, and keeps dynamic refresh, and the message making assailant reset lost efficacy, it is possible to have The problem that effect solves resisting asynchronous attack;Have employed mutual authentication method to realize the certification of identity, and introduce extra lightweight (x, y) carrys out the message in coded communication to nonlinear function NLMC, improves radio frequency identification system and communicates in open environment Confidentiality, safer.
Accompanying drawing explanation
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
Fig. 1 is the flow chart of steps of a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method of the present invention;
Fig. 2 is nonlinear function NLMC (x, concrete operation flow chart y);
Fig. 3 is the schematic diagram of radio frequency identification verification process of the present invention.
Detailed description of the invention
With reference to Fig. 1, a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC(x, y) nonlinear function computing, ROT(x, y) B=(K1 K is obtained after functional operation and XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B | | N1 is transmitted to background server;Described K1 *=ROT(K1⊕Nm,K1), K2 *=ROT(K2⊕Nm,K2), Nm=NLMC (Nt,N1);Its In, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent and disappear The encryption key of breath, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | B | | in N1 The data of IDS data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then perform Step S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with IDS data Corresponding K1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication Label failure, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2Close with session Key NtIt is updated, and through NLMC(x, y) nonlinear function computing, ROT(x, y) sent out after functional operation and XOR Give data C and the D of label;
S6, label go out data N from the extracting data received2', and through NLMC(x, y) nonlinear function computing, ROT (x y) obtains data D ' after functional operation and XOR, then judges label pair according to data D are the most equal with data D ' Whether reader is proved to be successful.
Wherein, nonlinear function NLMC (x, is y) to use genetic programming thought, by introducing ultralight operand assembly, from And the nonlinearity function obtained.(x, y) function only require on hardware that label has right displacement behaviour to realize NLMC on label The ability made, this function has the character of extra lightweight, and its concrete operations are as shown in Figure 2.ROT(x, y) function is left-handed function, For by left-handed for the value of x y position.Nt' is the session key of background server end, if communication is correct, with NtUnanimously.The calculating of B ' Journey and the formula used are consistent with B, differ only in NtChange N intot'.N2' is the random number that tab end is extracted, if communication Correct then N with reader end2Unanimously.The calculating process of D ' and the formula used are consistent with D, differ only in N2Change into N2'.
It is further used as preferred embodiment, described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old Label assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC(x, y) nonlinear function computing, ROT(x, y) functional operation and XOR, from And obtain being sent to data C of label and D.
It is further used as preferred embodiment, described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith New session key Nt newComputing formula as follows:
Wherein, ID represents the identity indications of label.
Being further used as preferred embodiment, in described step C53, the computing formula of described data C is: C=ROT (K1⊕K2, Nm ') and N2;The computing formula of described data D is: D=(K2*+ Nx) ((K1 K2) ∨ K1*).
It is further used as preferred embodiment, described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC(N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2With Data NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein, IDSnew=(IDS+ID) (Nm '+K1 *), K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
It is further used as preferred embodiment, by IDS in described step S52new、K1 new、K2 newAnd Nt newStore to rear The step for of station server, itself particularly as follows:
Judge the IDS calculatednewThe most identical with arbitrary IDS data of background server storage, the most again give birth to Become random number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newDeposit Storage is to background server.
Below in conjunction with Figure of description and specific embodiment, the present invention is described in further detail.
Reference Fig. 3, the first embodiment of the present invention:
One asynchronous attack resistant ultra-lightweight radio frequency identification authentication method of the present invention, for radio frequency identification system System carries out between label and reader safety certification during radio communication.The radio frequency identification system of the present invention includes mark Label, reader and background server.Wherein passive read-write formula label selected by label, and the inside EEPROM of label stores data, Its interior door circuit is not required to produce pseudo random number, it is only necessary to meet bit arithmetic (XOR, shift operation etc.) operation, and energy Realize NLMC (x, y) function of function operation.
The invention mainly comprises certification initial phase, the two-way authentication stage, label assumed name and key updating stage this three The individual stage.
Certification initial phase, specific as follows:
Five-tuple (ID, IDS, K it is loaded in each label1,K2,Nt), wherein ID represents the identity indications of label;IDS Representing the assumed name of label, initial value is the binary number of 96bit, and its value is Hash (ID);The ID of label is unique, therefore, After Hash operation, unique IDS can be obtained;K1、K2Representing the encryption key of message, its initial value is 96bit's Binary system random number;NtRepresenting the session key in radio frequency identification system communication process, arranging its initial value is 96bit bis- System number, its value is through function NLMC (N1, N2) result after computing, wherein N1,N2Produce for reader pseudorandom number generator Raw random number.
One seven tuple (ID, IDS is retained in background servernew,IDSold,K1 new,K1 old,K2 new,K2 old).Wherein ID represents the identity indications of label;(IDSnew,K1 new, K2 new) this is recognized to represent the assumed name of this certification of label, label respectively The K of card1、K2Key, they are all the binary numbers of 96bit, and initial value is equal to tag ID S, the initial value of label key K1, K2; (IDSold,K1 old,K2 old) represent the key of label in the assumed name IDS of label in last time verification process, last time verification process respectively (IDS, K1, K2) initial value of K1, K2, their initial value and label is identical, is all the binary number of 96bit.
With reference to Fig. 3, the concrete execution process of the verification process of radio frequency identification system is as follows:
Randomizer in a, reader produces random number N1;Then to the label chosen send message (Query | | N1)。
B, label receive data N that reader sends over1After communication request, calculate A=(IDS ∨ K according to formula2) +Nt、Nm=NLMC(Nt,N1)、K1 *=ROT(K1⊕Nm,K1)、K2 *=ROT(K2⊕Nm,K2)、B=(K1⊕K2 *)+(K1 *⊕K1);Then Message (IDS | | A | | B) is sent to reader, and reader is again by message (IDS | | A | | B | | N1) it is transmitted to background server; Wherein NLMC (x, the parameter during y) representative function acts on bracket.
After c, server receive message, first look for the IDS in backstagenewAnd IDSoldRecord, verifies the two data energy No with receive message id S | | the A | | IDS in B and mate;If the match is successful, from message, just extract Nt=A-IDS ∨ K2, so After according to the computing formula in label, with the K corresponding with IDS1、K2Calculate B '=(K1⊕K2 *)+(K1 *⊕K2), it is used for verifying B '=B Whether set up;If equation is set up, then reader checking label success, and forward step d to;Otherwise authentification failure, terminates current Session.After server and reader success identity label, generate random number N2, calculate Nx=NLMC(Nm,N2)、C=ROT(K1⊕ K2,Nm)⊕N2、D=(K2 *+Nx)⊕((K1⊕K2)∨K1 *);The most more new data K1 new=K1 *、K1 old=K1、K2 new=K2 *、K2 old= K2、IDSold=IDS、IDSnew=(IDS+ID)⊕(Nm+K1 *), by message C | | D is sent to label.
D, label receive message C | | after D, from message, first extract N2=C⊕ROT(K1⊕K2,Nm);Then with rear The formula that station server is identical calculates whether D ', checking equation D '=D set up, wherein D '=(K2 *+Nx)⊕((K1⊕K2)∨= K1 *);If equation is set up, then update data ID S=(IDS+ID) (Nm+=K1 *), K1==K1 *、K2==K2 *、Nt=Nx。
The present invention operation by step a to d, it is achieved that label and the two-way authentication of reader, and the mark being proved to be successful Sign and reader can carry out subsequent communications.
Compared with prior art, the invention have the advantages that
(1) hardware aspect
The lowest computing cost: label has only to meet bit arithmetic, include the behaviour such as logical operations, XOR, shift operation Make;
B. low communication cost: agreement only needs the traffic (with reference to Fig. 3) of 3 samsaras, and the quantity of information of exchange is few;
C. the hardware spending on label is little: label need not the function with pseudorandom number generator, required gate circuit number Amount greatly reduces;
D. the operand on label is few: label only need to be performed 16 logical operation, 3 ROT (x, y) function behaviour Make, (x, y) function operation just can realize the authentication between RFID label tag and RFID reader to 2 NLMC.
(2) present invention is provided with data N in the labelt, these data and the reader in last time verification process produce with Machine number is correlated with, and keeps dynamic refresh, is thus equivalent to label and is also provided with the ability producing random number, but need not again Increase extra hardware, it is possible to efficient solution award of bid label and back-end data base data synchronization problems.
(3) the radio frequency identification system authentication that the present invention is realized by two-way authentication, improves less radio-frequency The confidentiality that identification system communicates in open environment, can resisting asynchronous attack, man-in-the-middle attack, Replay Attack, refusal service The attack pattern that the radio frequency identification systems such as attack are common.
(4) present invention has the advantage that algorithm is novel simply, fast response time, resource requirement are few, be easily achieved, it is adaptable to Solve the safety problem of low cost RFID label.
It is above the preferably enforcement of the present invention is illustrated, but the invention is not limited to described enforcement Example, those of ordinary skill in the art also can make all equivalent variations on the premise of spirit of the present invention or replace Changing, deformation or the replacement of these equivalents are all contained in the application claim limited range.

Claims (5)

1. an asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, it is characterised in that: including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC (x, y) nonlinear function computing, ROT (x, y) letter Number computing obtains B=(K1 K after XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B | | N1 is transmitted to background server;Described K1 *=ROT (K1⊕Nm,K1), K2 *=ROT (K2⊕Nm,K2), Nm=NLMC (Nt,N1); Wherein, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent The encryption key of message, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | the B | | IDS in N1 The data of data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then step is performed Rapid S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with relative with IDS data The K answered1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication mark Signing unsuccessfully, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2With session key NtEnter Row updates, and (x, (x y) obtains being sent to mark after functional operation and XOR for y) nonlinear function computing, ROT through NLMC Data C signed and D;
S6, label go out data N from the extracting data received2', and through NLMC (x, y) nonlinear function computing, ROT (x, y) Obtain data D ' after functional operation and XOR, then judge that label is to reading according to data D are the most equal with data D ' Whether device is proved to be successful;
Described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old label Assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key K1 new、 New secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC (x, y) nonlinear function computing, ROT (x, y) functional operation and XOR, thus To data C and the D that are sent to label.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 1, its feature It is: described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt newComputing formula such as Under:
Nm ′ = N L M C ( N t ′ , N 1 ) N x = N L M C ( N m ′ , N 2 ) IDS n e w = ( I D S + I D ) ⊕ ( N x + K 1 * ) K 1 n e w = K 1 * K 2 n e w = K 2 * N t n e w = N x
Wherein, ID represents the identity indications of label.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 2, its feature Being: in described step S53, the computing formula of described data C is: C=ROT (K1⊕K2, Nm ') and N2;Described data D Computing formula is: D=(K2*+Nx)⊕((K1⊕K2)∨K1*)。
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 3, its feature It is: described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC (N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2And data NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein, IDSnew =(IDS+ID) (Nm '+K1 *),K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 4, its feature It is: by IDS in described step S52new、K1 new、K2 newAnd Nt newThe step for of storage to background server, itself particularly as follows:
Judge the IDS calculatednewWhether the most identical with arbitrary IDS data of background server storage, the most then regenerate with Machine number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newStore to Background server.
CN201310654793.4A 2013-12-06 2013-12-06 A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method Expired - Fee Related CN103699863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310654793.4A CN103699863B (en) 2013-12-06 2013-12-06 A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310654793.4A CN103699863B (en) 2013-12-06 2013-12-06 A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method

Publications (2)

Publication Number Publication Date
CN103699863A CN103699863A (en) 2014-04-02
CN103699863B true CN103699863B (en) 2016-08-17

Family

ID=50361387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310654793.4A Expired - Fee Related CN103699863B (en) 2013-12-06 2013-12-06 A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method

Country Status (1)

Country Link
CN (1) CN103699863B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333537A (en) * 2014-10-22 2015-02-04 浙江中烟工业有限责任公司 RFID security authentication method based on physical unclonable function
CN104504426B (en) * 2015-01-07 2017-07-14 郑州轻工业学院 The authentication method of RFID label tag and back-end data base based on lightweight collection of functions
CN106998252B (en) * 2017-05-18 2019-10-25 西安电子科技大学 Lightweight RFID cluster label authentication method based on cloud database
WO2019209233A1 (en) * 2018-04-26 2019-10-31 Dokuz Eylül Üni̇versi̇tesi̇ Rektörlüğü Fast and lightweight random number generator
CN109086390B (en) * 2018-07-27 2022-03-25 北京中关村科金技术有限公司 Method for realizing real-time monitoring of data consistency

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006015145A2 (en) * 2004-07-29 2006-02-09 Rsa Security Inc. Methods and apparatus for rfid device authentication
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
CN103413109B (en) * 2013-08-13 2016-04-06 江西理工大学 A kind of mutual authentication method of radio frequency identification system

Also Published As

Publication number Publication date
CN103699863A (en) 2014-04-02

Similar Documents

Publication Publication Date Title
CN104184733B (en) A kind of RFID lightweight mutual authentication methods encoded based on CRC
CN105100112B (en) RFID cluster label ownership transfer methods based on cloud storage
CN103905202B (en) A kind of RFID lightweight mutual authentication methods based on PUF
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
CN103699863B (en) A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method
CN101847199B (en) Security authentication method for radio frequency recognition system
CN103699920B (en) RF identification mutual authentication method based on elliptic curve
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN103078744B (en) Public key-based bidirectional radio frequency identification authorization method
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN107979840A (en) A kind of the car networking V2I Verification Systems and method of Key-insulated safety
CN104885091A (en) RFID tag and method for operating RFID tag
CN106411505B (en) A kind of mutual authentication method and Mobile RFID system of Mobile RFID
CN106998252B (en) Lightweight RFID cluster label authentication method based on cloud database
CN106712962A (en) Mobile RFID system bidirectional authentication method and system
CN103795543A (en) Bidirectional security authentication method for RFIP system
CN103532718A (en) Authentication method and authentication system
CN103716164B (en) A kind of RFID mutual authentication method of extra lightweight
CN109756893A (en) A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps
CN110190965A (en) A kind of RFID cluster label authentication protocol based on hash function
CN104883681A (en) Mobile RFID mutual authentication method based on dynamic shared secret key
CN103634788A (en) Certificateless multi-proxy signcryption method with forward secrecy
CN110190966A (en) A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage
CN104506533B (en) A kind of RFID tag ownership transfer method based on PUF
CN108566385A (en) The mutual authentication method of efficient secret protection based on cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160817