CN103699863B - A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method - Google Patents
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method Download PDFInfo
- Publication number
- CN103699863B CN103699863B CN201310654793.4A CN201310654793A CN103699863B CN 103699863 B CN103699863 B CN 103699863B CN 201310654793 A CN201310654793 A CN 201310654793A CN 103699863 B CN103699863 B CN 103699863B
- Authority
- CN
- China
- Prior art keywords
- new
- ids
- data
- label
- secret key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000006854 communication Effects 0.000 claims abstract description 12
- 239000000284 extract Substances 0.000 claims description 8
- 238000004891 communication Methods 0.000 abstract description 8
- 238000012795 verification Methods 0.000 abstract description 7
- 239000002131 composite material Substances 0.000 abstract 1
- 230000000875 corresponding effect Effects 0.000 description 3
- 230000002596 correlated effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002068 genetic effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
Abstract
The invention discloses a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, label is additionally arranged session key NtAs flag bit, the random number that this flag bit produces to reader in last time verification process is relevant, and keeps dynamic refresh, and the message making assailant reset lost efficacy, it is possible to the effectively problem of the resisting asynchronous attack of solution;Have employed mutual authentication method to realize the certification of identity, and (x, y) carrys out the message in coded communication, improves the confidentiality that radio frequency identification system communicates in open environment, safer to introduce the nonlinear function NLMC of extra lightweight.The composite can be widely applied to radio frequency identification field.
Description
Technical field
The present invention relates to radio frequency identification field, especially a kind of asynchronous attack resistant ultra-lightweight radio frequency identification
Authentication method.
Background technology
In prior art, radio frequency identification (RFID, Radio Frequency Identification) be numerous from
The one of dynamic identification technology, its ultimate principle is to utilize radiofrequency signal and Space Coupling (inductance or electromagnetic coupled) transmission characteristic,
Realize the automatic identification to identified object.Based on the advantage that RFID is numerous, RFID obtained quite varied application and
Receive more and more attention.
Existing extra lightweight radio frequency identification authentication method based on XOR is low to the requirement of hardware, its label
Not having the ability producing pseudo random number, but the defect of this authentication method is, when assailant eavesdrop and reset message time, service
Device end is difficult to verify the legitimacy of this message, so that illegal label certification is passed through, causes the data of server end and tab end
Update asynchronous, the problem causing asynchronous attacks.
Summary of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to: the super of the high and anti-asynchronous attacks of a kind of safety is provided
Lightweight radio frequency identification authentication method.
The technical solution adopted for the present invention to solve the technical problems is: the extra lightweight of a kind of anti-asynchronous attacks is wireless to be penetrated
Frequently identification authentication method, including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1;
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC(x, y) nonlinear function computing, ROT(x, y)
B=(K1 K is obtained after functional operation and XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B
| | N1 is transmitted to background server;Described K1 *=ROT(K1⊕Nm,K1), K2 *=ROT(K2⊕Nm,K2), Nm=NLMC (Nt,N1);Its
In, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent and disappear
The encryption key of breath, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | B | | in N1
The data of IDS data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then perform
Step S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with IDS data
Corresponding K1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication
Label failure, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2Close with session
Key NtIt is updated, and through NLMC(x, y) nonlinear function computing, ROT(x, y) sent out after functional operation and XOR
Give data C and the D of label;
S6, label go out data N from the extracting data received2', and through NLMC(x, y) nonlinear function computing, ROT
(x y) obtains data D ' after functional operation and XOR, then judges label pair according to data D are the most equal with data D '
Whether reader is proved to be successful.
Further, described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old
Label assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key
K1 new, new secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC(x, y) nonlinear function computing, ROT(x, y) functional operation and XOR, from
And obtain being sent to data C of label and D.
Further, described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt newMeter
Calculation formula is as follows:
Wherein, ID represents the identity indications of label.
Further, in described step C53, the computing formula of described data C is: C=ROT(K1⊕K2, Nm ') and N2;Institute
The computing formula stating data D is: D=(K2*+ Nx) ((K1 K2) ∨ K1*).
Further, described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC(N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2With
Data NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein,
IDSnew=(IDS+ID) (Nm '+K1 *), K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
Further, by IDS in described step S52new、K1 new、K2 newAnd Nt newThe step for of storage to background server, its
Particularly as follows:
Judge the IDS calculatednewThe most identical with arbitrary IDS data of background server storage, the most again give birth to
Become random number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newDeposit
Storage is to background server.
The invention has the beneficial effects as follows: be additionally arranged session key N in the labeltAs flag bit, this flag bit and last time
The random number that in verification process, reader produces is correlated with, and keeps dynamic refresh, and the message making assailant reset lost efficacy, it is possible to have
The problem that effect solves resisting asynchronous attack;Have employed mutual authentication method to realize the certification of identity, and introduce extra lightweight
(x, y) carrys out the message in coded communication to nonlinear function NLMC, improves radio frequency identification system and communicates in open environment
Confidentiality, safer.
Accompanying drawing explanation
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
Fig. 1 is the flow chart of steps of a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method of the present invention;
Fig. 2 is nonlinear function NLMC (x, concrete operation flow chart y);
Fig. 3 is the schematic diagram of radio frequency identification verification process of the present invention.
Detailed description of the invention
With reference to Fig. 1, a kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1;
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC(x, y) nonlinear function computing, ROT(x, y)
B=(K1 K is obtained after functional operation and XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B
| | N1 is transmitted to background server;Described K1 *=ROT(K1⊕Nm,K1), K2 *=ROT(K2⊕Nm,K2), Nm=NLMC (Nt,N1);Its
In, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent and disappear
The encryption key of breath, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | B | | in N1
The data of IDS data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then perform
Step S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with IDS data
Corresponding K1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication
Label failure, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2Close with session
Key NtIt is updated, and through NLMC(x, y) nonlinear function computing, ROT(x, y) sent out after functional operation and XOR
Give data C and the D of label;
S6, label go out data N from the extracting data received2', and through NLMC(x, y) nonlinear function computing, ROT
(x y) obtains data D ' after functional operation and XOR, then judges label pair according to data D are the most equal with data D '
Whether reader is proved to be successful.
Wherein, nonlinear function NLMC (x, is y) to use genetic programming thought, by introducing ultralight operand assembly, from
And the nonlinearity function obtained.(x, y) function only require on hardware that label has right displacement behaviour to realize NLMC on label
The ability made, this function has the character of extra lightweight, and its concrete operations are as shown in Figure 2.ROT(x, y) function is left-handed function,
For by left-handed for the value of x y position.Nt' is the session key of background server end, if communication is correct, with NtUnanimously.The calculating of B '
Journey and the formula used are consistent with B, differ only in NtChange N intot'.N2' is the random number that tab end is extracted, if communication
Correct then N with reader end2Unanimously.The calculating process of D ' and the formula used are consistent with D, differ only in N2Change into
N2'.
It is further used as preferred embodiment, described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old
Label assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key
K1 new, new secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC(x, y) nonlinear function computing, ROT(x, y) functional operation and XOR, from
And obtain being sent to data C of label and D.
It is further used as preferred embodiment, described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith
New session key Nt newComputing formula as follows:
Wherein, ID represents the identity indications of label.
Being further used as preferred embodiment, in described step C53, the computing formula of described data C is: C=ROT
(K1⊕K2, Nm ') and N2;The computing formula of described data D is: D=(K2*+ Nx) ((K1 K2) ∨ K1*).
It is further used as preferred embodiment, described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC(N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2With
Data NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein,
IDSnew=(IDS+ID) (Nm '+K1 *), K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
It is further used as preferred embodiment, by IDS in described step S52new、K1 new、K2 newAnd Nt newStore to rear
The step for of station server, itself particularly as follows:
Judge the IDS calculatednewThe most identical with arbitrary IDS data of background server storage, the most again give birth to
Become random number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newDeposit
Storage is to background server.
Below in conjunction with Figure of description and specific embodiment, the present invention is described in further detail.
Reference Fig. 3, the first embodiment of the present invention:
One asynchronous attack resistant ultra-lightweight radio frequency identification authentication method of the present invention, for radio frequency identification system
System carries out between label and reader safety certification during radio communication.The radio frequency identification system of the present invention includes mark
Label, reader and background server.Wherein passive read-write formula label selected by label, and the inside EEPROM of label stores data,
Its interior door circuit is not required to produce pseudo random number, it is only necessary to meet bit arithmetic (XOR, shift operation etc.) operation, and energy
Realize NLMC (x, y) function of function operation.
The invention mainly comprises certification initial phase, the two-way authentication stage, label assumed name and key updating stage this three
The individual stage.
Certification initial phase, specific as follows:
Five-tuple (ID, IDS, K it is loaded in each label1,K2,Nt), wherein ID represents the identity indications of label;IDS
Representing the assumed name of label, initial value is the binary number of 96bit, and its value is Hash (ID);The ID of label is unique, therefore,
After Hash operation, unique IDS can be obtained;K1、K2Representing the encryption key of message, its initial value is 96bit's
Binary system random number;NtRepresenting the session key in radio frequency identification system communication process, arranging its initial value is 96bit bis-
System number, its value is through function NLMC (N1, N2) result after computing, wherein N1,N2Produce for reader pseudorandom number generator
Raw random number.
One seven tuple (ID, IDS is retained in background servernew,IDSold,K1 new,K1 old,K2 new,K2 old).Wherein
ID represents the identity indications of label;(IDSnew,K1 new, K2 new) this is recognized to represent the assumed name of this certification of label, label respectively
The K of card1、K2Key, they are all the binary numbers of 96bit, and initial value is equal to tag ID S, the initial value of label key K1, K2;
(IDSold,K1 old,K2 old) represent the key of label in the assumed name IDS of label in last time verification process, last time verification process respectively
(IDS, K1, K2) initial value of K1, K2, their initial value and label is identical, is all the binary number of 96bit.
With reference to Fig. 3, the concrete execution process of the verification process of radio frequency identification system is as follows:
Randomizer in a, reader produces random number N1;Then to the label chosen send message (Query | |
N1)。
B, label receive data N that reader sends over1After communication request, calculate A=(IDS ∨ K according to formula2)
+Nt、Nm=NLMC(Nt,N1)、K1 *=ROT(K1⊕Nm,K1)、K2 *=ROT(K2⊕Nm,K2)、B=(K1⊕K2 *)+(K1 *⊕K1);Then
Message (IDS | | A | | B) is sent to reader, and reader is again by message (IDS | | A | | B | | N1) it is transmitted to background server;
Wherein NLMC (x, the parameter during y) representative function acts on bracket.
After c, server receive message, first look for the IDS in backstagenewAnd IDSoldRecord, verifies the two data energy
No with receive message id S | | the A | | IDS in B and mate;If the match is successful, from message, just extract Nt=A-IDS ∨ K2, so
After according to the computing formula in label, with the K corresponding with IDS1、K2Calculate B '=(K1⊕K2 *)+(K1 *⊕K2), it is used for verifying B '=B
Whether set up;If equation is set up, then reader checking label success, and forward step d to;Otherwise authentification failure, terminates current
Session.After server and reader success identity label, generate random number N2, calculate Nx=NLMC(Nm,N2)、C=ROT(K1⊕
K2,Nm)⊕N2、D=(K2 *+Nx)⊕((K1⊕K2)∨K1 *);The most more new data K1 new=K1 *、K1 old=K1、K2 new=K2 *、K2 old=
K2、IDSold=IDS、IDSnew=(IDS+ID)⊕(Nm+K1 *), by message C | | D is sent to label.
D, label receive message C | | after D, from message, first extract N2=C⊕ROT(K1⊕K2,Nm);Then with rear
The formula that station server is identical calculates whether D ', checking equation D '=D set up, wherein D '=(K2 *+Nx)⊕((K1⊕K2)∨=
K1 *);If equation is set up, then update data ID S=(IDS+ID) (Nm+=K1 *), K1==K1 *、K2==K2 *、Nt=Nx。
The present invention operation by step a to d, it is achieved that label and the two-way authentication of reader, and the mark being proved to be successful
Sign and reader can carry out subsequent communications.
Compared with prior art, the invention have the advantages that
(1) hardware aspect
The lowest computing cost: label has only to meet bit arithmetic, include the behaviour such as logical operations, XOR, shift operation
Make;
B. low communication cost: agreement only needs the traffic (with reference to Fig. 3) of 3 samsaras, and the quantity of information of exchange is few;
C. the hardware spending on label is little: label need not the function with pseudorandom number generator, required gate circuit number
Amount greatly reduces;
D. the operand on label is few: label only need to be performed 16 logical operation, 3 ROT (x, y) function behaviour
Make, (x, y) function operation just can realize the authentication between RFID label tag and RFID reader to 2 NLMC.
(2) present invention is provided with data N in the labelt, these data and the reader in last time verification process produce with
Machine number is correlated with, and keeps dynamic refresh, is thus equivalent to label and is also provided with the ability producing random number, but need not again
Increase extra hardware, it is possible to efficient solution award of bid label and back-end data base data synchronization problems.
(3) the radio frequency identification system authentication that the present invention is realized by two-way authentication, improves less radio-frequency
The confidentiality that identification system communicates in open environment, can resisting asynchronous attack, man-in-the-middle attack, Replay Attack, refusal service
The attack pattern that the radio frequency identification systems such as attack are common.
(4) present invention has the advantage that algorithm is novel simply, fast response time, resource requirement are few, be easily achieved, it is adaptable to
Solve the safety problem of low cost RFID label.
It is above the preferably enforcement of the present invention is illustrated, but the invention is not limited to described enforcement
Example, those of ordinary skill in the art also can make all equivalent variations on the premise of spirit of the present invention or replace
Changing, deformation or the replacement of these equivalents are all contained in the application claim limited range.
Claims (5)
1. an asynchronous attack resistant ultra-lightweight radio frequency identification authentication method, it is characterised in that: including:
S1, the randomizer of reader produce random number N1, then send message Query to the label chosen | | N1;
S2, tag computation go out A=(IDS ∨ K2)+NtValue, and through NLMC (x, y) nonlinear function computing, ROT (x, y) letter
Number computing obtains B=(K1 K after XOR2 *)+(K1 *⊕K2) value, be then passed through reader by message id S | | A | | B |
| N1 is transmitted to background server;Described K1 *=ROT (K1⊕Nm,K1), K2 *=ROT (K2⊕Nm,K2), Nm=NLMC (Nt,N1);
Wherein, IDS represents the assumed name of label, NtRepresent the session key in radio frequency identification system communication process, K1、K2All represent
The encryption key of message, " ∨ " represents logical addition computing, and " " represents XOR;
S3, background server check whether its IDS data stored store can with message id S | | A | | the B | | IDS in N1
The data of data match;If it is not, represent the failure of reader authentication label, termination protocol, flow process terminates;Otherwise, then step is performed
Rapid S4;
S4, background server are from message id S, and | | A | | B | | extracts N N1t'=A-(IDS ∨ K2), and with relative with IDS data
The K answered1、K2Calculate B '=(K1 K2 *)+(K1 *⊕K2);Then judge whether B ' is equal to B, if it is not, represent reader authentication mark
Signing unsuccessfully, termination protocol, flow process terminates;Otherwise, then step S5 is performed;
S5, reader generate random number N2, label assumed name IDS, secret key K to background server1, secret key K2With session key NtEnter
Row updates, and (x, (x y) obtains being sent to mark after functional operation and XOR for y) nonlinear function computing, ROT through NLMC
Data C signed and D;
S6, label go out data N from the extracting data received2', and through NLMC (x, y) nonlinear function computing, ROT (x, y)
Obtain data D ' after functional operation and XOR, then judge that label is to reading according to data D are the most equal with data D '
Whether device is proved to be successful;
Described step S5, comprising:
S51, reader generate random number N2, and by label assumed name IDS current for reader, secret key K1, secret key K2As old label
Assumed name IDS, old secret key K1, old secret key K2Store to background server;
S52, reader are to data N1、N2、IDS、K1、K2Calculate, thus obtain new label assumed name IDSnew, new secret key K1 new、
New secret key K2 newWith new session key Nt new, and by IDSnew、K1 new、K2 newAnd Nt newStore to background server;
S53, reader to through NLMC (x, y) nonlinear function computing, ROT (x, y) functional operation and XOR, thus
To data C and the D that are sent to label.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 1, its feature
It is: described new label assumed name IDSnew, new secret key K1 new, new secret key K2 newWith new session key Nt newComputing formula such as
Under:
Wherein, ID represents the identity indications of label.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 2, its feature
Being: in described step S53, the computing formula of described data C is: C=ROT (K1⊕K2, Nm ') and N2;Described data D
Computing formula is: D=(K2*+Nx)⊕((K1⊕K2)∨K1*)。
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 3, its feature
It is: described step S6, comprising:
S61, label go out data N from the extracting data received2', described data N2The computing formula of ' is:
N2'=C ROT (K1⊕K2, Nm ');
The N that S62, basis extract2Data D ' is calculated by ', and the computing formula of described data D ' is:
D '=(K2 *+ Nx ') ((K1⊕K2)∨K1 *), wherein, Nx '=NLMC (N2', Nt');
S63, judge that data D are the most equal with data D ', if equal, then IDS data, secret key K to label1, secret key K2And data
NtIt is updated, thus IDS data ID S after being updatednew, secret key K1 new, secret key K2 newWith data Nt new;Wherein, IDSnew
=(IDS+ID) (Nm '+K1 *),K1 new=K1 *, K2 new=K2 *, Nt new=Nx '.
A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method the most according to claim 4, its feature
It is: by IDS in described step S52new、K1 new、K2 newAnd Nt newThe step for of storage to background server, itself particularly as follows:
Judge the IDS calculatednewWhether the most identical with arbitrary IDS data of background server storage, the most then regenerate with
Machine number N2And calculate the IDS of correspondencenew、K1 new、K2 newAnd Nt new;Otherwise, then by IDSnew、K1 new、K2 newAnd Nt newStore to
Background server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310654793.4A CN103699863B (en) | 2013-12-06 | 2013-12-06 | A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310654793.4A CN103699863B (en) | 2013-12-06 | 2013-12-06 | A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103699863A CN103699863A (en) | 2014-04-02 |
CN103699863B true CN103699863B (en) | 2016-08-17 |
Family
ID=50361387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310654793.4A Expired - Fee Related CN103699863B (en) | 2013-12-06 | 2013-12-06 | A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103699863B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104333537A (en) * | 2014-10-22 | 2015-02-04 | 浙江中烟工业有限责任公司 | RFID security authentication method based on physical unclonable function |
CN104504426B (en) * | 2015-01-07 | 2017-07-14 | 郑州轻工业学院 | The authentication method of RFID label tag and back-end data base based on lightweight collection of functions |
CN106998252B (en) * | 2017-05-18 | 2019-10-25 | 西安电子科技大学 | Lightweight RFID cluster label authentication method based on cloud database |
WO2019209233A1 (en) * | 2018-04-26 | 2019-10-31 | Dokuz Eylül Üni̇versi̇tesi̇ Rektörlüğü | Fast and lightweight random number generator |
CN109086390B (en) * | 2018-07-27 | 2022-03-25 | 北京中关村科金技术有限公司 | Method for realizing real-time monitoring of data consistency |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006015145A2 (en) * | 2004-07-29 | 2006-02-09 | Rsa Security Inc. | Methods and apparatus for rfid device authentication |
CN101051903A (en) * | 2007-03-30 | 2007-10-10 | 中山大学 | RFID random key two-way certifying method accord with EPC C1G2 standard |
CN103413109B (en) * | 2013-08-13 | 2016-04-06 | 江西理工大学 | A kind of mutual authentication method of radio frequency identification system |
-
2013
- 2013-12-06 CN CN201310654793.4A patent/CN103699863B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN103699863A (en) | 2014-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104184733B (en) | A kind of RFID lightweight mutual authentication methods encoded based on CRC | |
CN105100112B (en) | RFID cluster label ownership transfer methods based on cloud storage | |
CN103905202B (en) | A kind of RFID lightweight mutual authentication methods based on PUF | |
CN106845304B (en) | A kind of method and system for realizing reader and smart-tag authentication in RFID system | |
CN103699863B (en) | A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method | |
CN101847199B (en) | Security authentication method for radio frequency recognition system | |
CN103699920B (en) | RF identification mutual authentication method based on elliptic curve | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN103078744B (en) | Public key-based bidirectional radio frequency identification authorization method | |
CN104115442B (en) | RFID bidirectional authentication method based on asymmetric secret key and Hash function | |
CN107979840A (en) | A kind of the car networking V2I Verification Systems and method of Key-insulated safety | |
CN104885091A (en) | RFID tag and method for operating RFID tag | |
CN106411505B (en) | A kind of mutual authentication method and Mobile RFID system of Mobile RFID | |
CN106998252B (en) | Lightweight RFID cluster label authentication method based on cloud database | |
CN106712962A (en) | Mobile RFID system bidirectional authentication method and system | |
CN103795543A (en) | Bidirectional security authentication method for RFIP system | |
CN103532718A (en) | Authentication method and authentication system | |
CN103716164B (en) | A kind of RFID mutual authentication method of extra lightweight | |
CN109756893A (en) | A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps | |
CN110190965A (en) | A kind of RFID cluster label authentication protocol based on hash function | |
CN104883681A (en) | Mobile RFID mutual authentication method based on dynamic shared secret key | |
CN103634788A (en) | Certificateless multi-proxy signcryption method with forward secrecy | |
CN110190966A (en) | A kind of wireless radio frequency identification mark ownership transfer method based on cloud storage | |
CN104506533B (en) | A kind of RFID tag ownership transfer method based on PUF | |
CN108566385A (en) | The mutual authentication method of efficient secret protection based on cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160817 |