CN104463267A - RFID comprehensive encryption method for electric vehicle charging station - Google Patents

RFID comprehensive encryption method for electric vehicle charging station Download PDF

Info

Publication number
CN104463267A
CN104463267A CN201410608263.0A CN201410608263A CN104463267A CN 104463267 A CN104463267 A CN 104463267A CN 201410608263 A CN201410608263 A CN 201410608263A CN 104463267 A CN104463267 A CN 104463267A
Authority
CN
China
Prior art keywords
formula
write line
read write
charging station
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410608263.0A
Other languages
Chinese (zh)
Inventor
饶雪
刘剑
李俊娥
茹叶棋
田薇
杨国泰
何剑峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201410608263.0A priority Critical patent/CN104463267A/en
Publication of CN104463267A publication Critical patent/CN104463267A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to an RFID comprehensive encryption method for an electric vehicle charging station. The RFID comprehensive encryption method is applied to a security authentication system of the electric vehicle charging station. A DES algorithm is used in a project, a secure channel from a tag to a reader-writer is constructed, a secure channel from the reader-writer to a background database is then constructed through a public key signature authentication algorithm, finally a signature result is verified through a hash function, and a lightweight encryption system of the charging station is obtained. The RFID comprehensive encryption method has the advantages that a protocol participates in calculation and storage through the reader-writer, more data can be stored in the same space compared with other protocols, data mining of the charging station is facilitated in the later period, and a solid data foundation is laid for data analysis; encryption modes are diversified, system security is enhanced, and the capacity to resist typical attacks is strengthened; the quantity demand of a gate circuit needed for the encryption algorithm is near 15% lower than that of a gate circuit needed for a conventional SHA-256 algorithm in the protocol, and practical feasibility is achieved.

Description

The RFID integration encryption method of electric automobile charging station
Technical field
The present invention relates to a kind of encryption method of electric automobile charging station, is the lightweight encryption method based on RFID technique and Hybrid Encryption technology, effectively can improve charging station to the efficiency of electric automobile identification and authentication and security.
Background technology
Electric automobile has obvious advantage in efficiency, discharge and economy, is the main trend of China Automobile Industry.The electric automobile charging station volume of the flow of passengers is large, and relate to the problems such as information storage is large, information security, therefore, efficient, safe charging station Verification System seems especially crucial.At present, RFID technique sets up the important method of charging station security certification system.
Electric automobile charging station safety certification relates to client identity checking, charge record, information transmission supervisor, the problems such as existing Verification System ubiquity storage space is little, poor stability, efficiency are low.Even if apply the Verification System of RFID technique, also there is no effective ways and assess its security, and cryptographic algorithm is simple, information security can not get effective guarantee.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art, the invention provides a kind of comprehensive lightweight encryption method of RFID of electric automobile charging station.The safety problem such as impersonation attack, information leakage that the method utilizes Hybrid Encryption can prevent charging station may to run into, the account number safety of protection charging station; Adopt lightweight security protocol can increase calculating and the storage efficiency of system.
Of the present invention adopted technical scheme is:
A RFID integration encryption method for electric automobile charging station, is characterized in that: be RFID label tag is affixed on vehicle front windshield place, for recording the information of car owner and vehicle; After the rfid card of electric automobile enters Verification System magnetic field, the energy that the read write line that charging station is installed relies on induction current to obtain sends storage vehicle essential information in the chips, read write line obtains data and is sent to background data base after decoding, and database root carries out data analysis according to the security protocol of system to it; Security protocol definition is insecure channels to background data base again from label to read write line, then agreement is encrypted for whole RFID structure; This encrypting step is the whole rfid system for charging station, and be encrypted to the whole passage of label from background data base to read write line, concrete steps are as follows again:
Step 1: read write line generates random number R and sends to label, and when only one tag responds, this label is the label chosen, and communicates with next step for the calculating doing random number R, and the generation of random number R is based on following formula:
Generate formula:
R (n)=(aR (n-1)+b) mod n formula one
In formula, R (n) is random number sequence, and a is multiplier, and b is increment, and n is mould;
Step 2: label response starts communication, to be encrypted based on symmetric encipherment algorithm according to formula two to formula five pairs of random numbers or to decipher, obtain encrypted result m, and temporary mark P when m and label communication is returned to read write line as response, ciphering process carries out based on following formula:
L 0r 0← IP (<64bit input code) formula two
L i← R i-1i=1,2 ..., m formula three
R i← L i-1⊕ f (R i-1, k i) i=1,2 ..., m formula four
<64bit ciphertext > ← IP -1(R 16l 16) formula five
I represents iterations, and ⊕ represents that mould 2 is sued for peace by turn, and f is encryption function, and ki is the session key of 64;
Step 3: after read write line receives response m, P, use oneself private key and the PKI of background data base carry out encrypted signature according to formula six to formula eight: background data base uses the private key of background data base to be decrypted according to formula nine and obtains P and R, and uses the PKI of read write line to carry out certification to see whether be that read write line sends; Ciphering process carries out based on following formula:
C=m emod n formula six
S=f (m, p) formula seven
U=f (S, R) formula eight
Decrypting process carries out based on following formula:
M=c dmod n=m edmod n formula nine
Step 4: if the P that obtains is identical with certain data stored in background data base after background data base deciphering, then background data base more new data calculate U (S (ID i)), result is sent to read write line;
Step 5: after read write line receives the result, utilize the private key of oneself and the PKI of background data base to be decrypted according to formula ten to formula 13 and obtain label IDi, the hash function that read write line performs IDi calculates, and result is sent to label, the hash function that label performs ID calculates, if H (ID) is identical with H (IDi), then illustrate that hash address is identical, authentication success; Otherwise, authentification failure; Wherein decrypting process carries out based on following formula:
R 16l 16← IP<64bit ciphertext > formula ten
R i-1← L ii=m, 15 ..., 1 formula 11
L i← R i-1⊕ f (R i-1, k i) i=m, 15 ..., 1 formula 12
<64bit is > ← IP expressly -1(R 0l 0) formula 13.
In the RFID integration encryption method of above-mentioned a kind of electric automobile charging station, in described step 3, adopt the generative process of public, private key as follows:
Step 3.1, suppose that x and y is prime number, and x ≠ y;
Step 3.2, calculating Euler's function φ (n)=(x-1) (y-1);
Step 3.3, selection integer e make gcd (φ (n), e)=1 (1<e< φ (n));
Step 3.4, calculating de mod φ (n)=1;
Step 3.5, obtain PKI KU={e, n}, private key KR={d, n}.
In the RFID integration encryption method of above-mentioned a kind of electric automobile charging station, the Hash table structure in described step 5 adopts leaving remainder method:
Get key word by certain several b being not more than the long a of Hash table table except rear gained remainder is Hash Round Robin data partition;
H (key)=key mod b (b≤a) formula 14
Manage conflict and adopt open address method:
Hi=(H (key)+di) mod a i=1,2 ..., a-1 formula 15
Wherein, a is that the table of Hash table is long; Di is increment sequence when producing conflict.
Therefore, advantage of the present invention has: 1. this agreement participates in calculating and storing by read write line, can deposit more data, be convenient to the data mining of later stage charging station compared with other agreements under identical space, for data analysis provides solid data basis; 2., in conjunction with the Hybrid Encryption of RSA cryptographic algorithms, hash function, DES algorithm realization RFID, cipher mode variation, enhances system security, strengthens the ability of anti-typical attack; 3. realize gate circuit needed for cryptographic algorithm in agreement lower than the gate circuit demand of conventional SHA-256 algorithm nearly 15%, there is practical feasibility.
Accompanying drawing explanation
Fig. 1 is charging station RFID security certification system fundamental diagram.
Fig. 2 is security of system agreement flowchart.
Embodiment
Integration encryption method of the present invention is if Fig. 1 is by the principle of work of RFID, designs concrete encryption flow as Fig. 2.
Below by embodiment, and by reference to the accompanying drawings, technical scheme of the present invention is described in further detail.
Embodiment:
Describe according to accompanying drawing 2 charging station RFID integration encryption flow process:
The first step: read write line sends random number to label according to formula (1);
R(n)=(aR(n-1)+b)mod n (1)
In formula, R (n) is random number sequence, and a is multiplier, and b is increment, and n is mould;
Second step: label response starts communication, is encrypted, and is returned to read write line as response according to formula (2)-(5) to random number;
L 0r 0← IP (<64bit input code) (2)
L i←R i-1i=1,2,...,m (3)
R i←L i-1⊕f(R i-1,k i)i=1,2,...,m (4)
<64bit ciphertext > ← IP -1(R 16l 16) (5)
3rd step: read write line use oneself private key and the PKI of background data base carry out encrypted signature according to formula (6), (7)-(8):
c=m emod n (6)
S=f(m,p) (7)
U=f(S,R) (8)
4th step: background data base uses the private key of background data base to be decrypted according to formula (9) and obtains P and R, and use the PKI of read write line to carry out certification to see whether be that read write line sends, decrypting process:
m=c dmod n=m edmod n (9)
5th step: after authentication success, if the P that obtains is identical with certain data stored in background data base after judging deciphering, then background data base more new data calculate U (S (ID i)), result is sent to read write line;
6th step: after read write line receives the result, utilizes the private key of oneself and the PKI of background data base to be decrypted according to formula (10)-(13) and obtains label ID i, read write line performs ID according to formula (14), (15) ihash function calculate, and result is sent to label, the hash function that label performs ID according to formula (14), (15) calculates, if H (ID) and H (ID i) identical, then illustrate that hash address is identical, authentication success; Otherwise, authentification failure.
R 16l 16← IP<64bit ciphertext > (10)
R i-1←L ii=m,15,...,1 (11)
L i←R i-1⊕f(R i-1,k i)i=m,15,...,1 (12)
<64bit is > ← IP expressly -1(R 0l 0) (13)
H(key)=key mod b(b≤a) (14)
Hi=(H(key)+di)mod a i=1,2,...,a-1 (15)
In formula (14), (15):
A is that the table of Hash table is long, and b is the constant being less than a, and di is increment sequence when producing conflict.
Specific embodiment described herein is only to the explanation for example of the present invention's spirit.Those skilled in the art can make various amendment or supplement or adopt similar mode to substitute to described specific embodiment, but can't depart from spirit of the present invention or surmount the scope that appended claims defines.

Claims (3)

1. a RFID integration encryption method for electric automobile charging station, is characterized in that: be RFID label tag is affixed on vehicle front windshield place, for recording the information of car owner and vehicle; After the rfid card of electric automobile enters Verification System magnetic field, the energy that the read write line that charging station is installed relies on induction current to obtain sends storage vehicle essential information in the chips, read write line obtains data and is sent to background data base after decoding, and database root carries out data analysis according to the security protocol of system to it; Security protocol definition is insecure channels to background data base again from label to read write line, then agreement is encrypted for whole RFID structure; This encrypting step is the whole rfid system for charging station, and be encrypted to the whole passage of label from background data base to read write line, concrete steps are as follows again:
Step 1: read write line generates random number R and sends to label, and when only one tag responds, this label is the label chosen, and communicates with next step for the calculating doing random number R, and the generation of random number R is based on following formula:
Generate formula:
R (n)=(aR (n-1)+b) mod n formula one
In formula, R (n) is random number sequence, and a is multiplier, and b is increment, and n is mould;
Step 2: label response starts communication, to be encrypted based on symmetric encipherment algorithm according to formula two to formula five pairs of random numbers or to decipher, obtain encrypted result m, and temporary mark P when m and label communication is returned to read write line as response, ciphering process carries out based on following formula:
L 0r 0← IP (<64bit input code) formula two
L i← R i-1i=1,2 ..., m formula three
R i &LeftArrow; L i - 1 &CirclePlus; f ( R i - 1 , k i ) , i = 1,2 , . . . , m Formula four
<64bit ciphertext > ← IP -1(R 16l 16) formula five
I represents iterations, represent that mould 2 is sued for peace by turn, f is encryption function, and ki is the session key of 64;
Step 3: after read write line receives response m, P, use oneself private key and the PKI of background data base carry out encrypted signature according to formula six to formula eight: background data base uses the private key of background data base to be decrypted according to formula nine and obtains P and R, and uses the PKI of read write line to carry out certification to see whether be that read write line sends; Ciphering process carries out based on following formula:
C=m emod n formula six
S=f (m, p) formula seven
U=f (S, R) formula eight
Decrypting process carries out based on following formula:
M=c dmod n=m edmod n formula nine
Step 4: if the P that obtains is identical with certain data stored in background data base after background data base deciphering, then background data base more new data calculate U (S (ID i)), result is sent to read write line;
Step 5: after read write line receives the result, utilizes the private key of oneself and the PKI of background data base to be decrypted according to formula ten to formula 13 and obtains label ID i, read write line performs ID ihash function calculate, and result is sent to label, the hash function that label performs ID calculates, if H (ID) and H (ID i) identical, then illustrate that hash address is identical, authentication success; Otherwise, authentification failure; Wherein decrypting process carries out based on following formula:
R 16l 16← IP<64bit ciphertext > formula ten
R i-1← L ii=m, 15 ..., 1 formula 11
L i &LeftArrow; R i - 1 &CirclePlus; f ( R i - 1 , k i ) , i = m , 15 , . . . , 1 Formula 12
<64bit is > ← IP expressly -1(R 0l 0) formula 13.
2. the RFID integration encryption method of a kind of electric automobile charging station according to claim 1, is characterized in that: adopt the generative process of public, private key as follows in described step 3:
Step 3.1, suppose that x and y is prime number, and x ≠ y;
Step 3.2, calculating Euler's function φ (n)=(x-1) (y-1);
Step 3.3, selection integer e make gcd (φ (n), e)=1 (1<e< φ (n));
Step 3.4, calculating de mod φ (n)=1;
Step 3.5, obtain PKI KU={e, n}, private key KR={d, n}.
3. the RFID integration encryption method of a kind of electric automobile charging station according to claim 1, is characterized in that: the Hash table structure in described step 5 adopts leaving remainder method:
Get key word by certain several b being not more than the long a of Hash table table except rear gained remainder is Hash Round Robin data partition;
H (key)=key mod b (b≤a) formula 14
Manage conflict and adopt open address method:
Hi=(H (key)+di) moda i=1,2 ..., a-1 formula 15
Wherein, a is that the table of Hash table is long; Di is increment sequence when producing conflict.
CN201410608263.0A 2014-10-31 2014-10-31 RFID comprehensive encryption method for electric vehicle charging station Pending CN104463267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410608263.0A CN104463267A (en) 2014-10-31 2014-10-31 RFID comprehensive encryption method for electric vehicle charging station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410608263.0A CN104463267A (en) 2014-10-31 2014-10-31 RFID comprehensive encryption method for electric vehicle charging station

Publications (1)

Publication Number Publication Date
CN104463267A true CN104463267A (en) 2015-03-25

Family

ID=52909278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410608263.0A Pending CN104463267A (en) 2014-10-31 2014-10-31 RFID comprehensive encryption method for electric vehicle charging station

Country Status (1)

Country Link
CN (1) CN104463267A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850670A (en) * 2017-03-06 2017-06-13 浙江晨泰科技股份有限公司 A kind of charging pile communication system encrypting and decrypting method
CN110431825A (en) * 2017-05-19 2019-11-08 宝马股份公司 For providing the method for data record of vehicle, computer-readable medium, system and vehicle including the system to third party
CN117792660A (en) * 2024-02-23 2024-03-29 南京聚铭网络科技有限公司 Key data anti-repudiation method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨阳: "基于RFID技术的校园一卡通系统安全研究", 《网络在线出版》 *
袁署光等: "基于Hash函数的RFID认证协议", 《计算机工程》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850670A (en) * 2017-03-06 2017-06-13 浙江晨泰科技股份有限公司 A kind of charging pile communication system encrypting and decrypting method
CN110431825A (en) * 2017-05-19 2019-11-08 宝马股份公司 For providing the method for data record of vehicle, computer-readable medium, system and vehicle including the system to third party
CN110431825B (en) * 2017-05-19 2022-10-04 宝马股份公司 Method and system for providing data record of vehicle to third party and vehicle
CN117792660A (en) * 2024-02-23 2024-03-29 南京聚铭网络科技有限公司 Key data anti-repudiation method and system
CN117792660B (en) * 2024-02-23 2024-05-24 南京聚铭网络科技有限公司 Key data anti-repudiation method and system

Similar Documents

Publication Publication Date Title
CN103795534B (en) Authentication method and apparatus for carrying out the method based on password
CN111314089B (en) SM 2-based two-party collaborative signature method and decryption method
CN103413109B (en) A kind of mutual authentication method of radio frequency identification system
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN103078744B (en) Public key-based bidirectional radio frequency identification authorization method
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
CN107425971B (en) Certificateless data encryption/decryption method and device and terminal
CN102118710A (en) System and method for transmitting data between mobile terminals
CN102236773A (en) Radio frequency identification (RFID) encryption verification system and method
CN101789865A (en) Dedicated server used for encryption and encryption method
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN105635135A (en) Encryption system based on attribute sets and relational predicates and access control method
CN104821880A (en) Certificate-free generalized proxy signcryption method
CN107483191A (en) A kind of SM2 algorithm secret keys segmentation signature system and method
CN106845304A (en) A kind of method and system for realizing reader and smart-tag authentication in rfid system
Bai et al. Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card
CN104636672B (en) A kind of secure data reporting system based on Hash tree and anonymity technology
JP2011528876A (en) Data security access method suitable for electronic tags
CN107302436A (en) A kind of USB interface id password key
Kaur et al. A secure, lightweight, and privacy-preserving authentication scheme for V2G connections in smart grid
Bansal et al. Rama: Real-time automobile mutual authentication protocol using puf
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
Rabieh et al. Efficient and privacy-aware authentication scheme for EVs pre-paid wireless charging services
Latif et al. A review on key management and lightweight cryptography for IoT

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150325