CN104615967B - A kind of rolling code system and the double encryption approach based on rolling code - Google Patents

A kind of rolling code system and the double encryption approach based on rolling code Download PDF

Info

Publication number
CN104615967B
CN104615967B CN201510068536.1A CN201510068536A CN104615967B CN 104615967 B CN104615967 B CN 104615967B CN 201510068536 A CN201510068536 A CN 201510068536A CN 104615967 B CN104615967 B CN 104615967B
Authority
CN
China
Prior art keywords
uid
cards
reader
data
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510068536.1A
Other languages
Chinese (zh)
Other versions
CN104615967A (en
Inventor
张开生
权思敏
王静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi University of Science and Technology
Original Assignee
Shaanxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi University of Science and Technology filed Critical Shaanxi University of Science and Technology
Priority to CN201510068536.1A priority Critical patent/CN104615967B/en
Publication of CN104615967A publication Critical patent/CN104615967A/en
Application granted granted Critical
Publication of CN104615967B publication Critical patent/CN104615967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

One kind rolls code system, includes UID cards, UID cards and reader wireless connection;Its encrypt the step of be:One:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;Two:If legal, step 3 is carried out;Otherwise, authentication not passes through;Three:The ID number of UID cards and data command are sent to reader as data block, the data block received compared with the data block preserved, is verified whether ID number and data command are legal by reader, if legal, performs corresponding instruction;Otherwise, not perform;Four:Reader data block is encrypted modification using rolling code AES, and amended data block is sent into UID cards;Five:The data block that UID card storages receive, and as the initialization data of next data command authentication;The needs that user exchanges key are eliminated, add decoding difficulty, safe, anti-attack ability is strong.

Description

A kind of rolling code system and the double encryption approach based on rolling code
Technical field
The invention belongs to radio frequency identification and data encryption technology field, and in particular to one kind rolls code system and based on rolling The double encryption approach of code.
Background technology
Radio frequency identification is to identify specific objective by radio signals and read and write related data, without identifying system with A kind of recognition methods of any contact is established between specific objective, is widely used in the occasions such as automobile burglar, gate control system.But It is, it is also following along with safety problems such as the fast development of REID, information leakages.Active card information security Encryption technology confidentiality is poor, and anti-attack ability is weak to wait potential safety hazard existing for technical elements.
The content of the invention
In order to overcome the above-mentioned deficiencies of the prior art, code system is rolled and based on rolling it is an object of the invention to provide one kind The double encryption approach of activity code, user data is entered with the double encryption approach that rolling code is combined using rivest, shamir, adelman Row encryption, adds the difficulty of deciphering data, and it is poor to solve active card information security encryption technology confidentiality, anti-attack ability It is weak to wait potential safety hazard existing for technical elements, there is the characteristics of safe, anti-attack ability is strong.
To achieve these goals, the technical solution adopted by the present invention is:One kind rolls code system, includes UID cards, UID cards and reader wireless connection;
Described UID cards are for memory card exclusive identification code ID number, data command and key pair;
Described reader utilizes the characteristic that the sector of UID cards 0 can arbitrarily change, and utilizes the method data for rolling code encryption Modification is encrypted in instruction authentication information.
The bidirectional identity authentication of described reader and UID cards uses the RSA cryptographic algorithms of asymmet-ric encryption method, exempts User exchanges the needs of key, increases data security.
Described rolling code, by the way that afterwards data are encrypted with modification, makes user every in each data command authentication Secondary data command information differs, and adds decoding difficulty.
A kind of double encryption approach based on rolling code, comprises the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:Using the ID number of UID cards and data command as data block it is sent to reader, reader will receive Data block verifies whether ID number and data command are legal compared with the data block preserved, if legal, perform and grasps in next step Make, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just without in next step Operation;
Step 4:Reader data block is encrypted modification using rolling code AES, and by amended data Block is sent to UID cards;
Step 5:The data block that UID card storages receive, and as the initialization of next data command authentication Data.
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number B, ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise Authentication not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reading Device;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, number is verified According to block;Otherwise, UID cards identification mistake.
The beneficial effects of the invention are as follows:
Compared with prior art, the present invention is recognized using the bidirectional identification of rivest, shamir, adelman progress reader and UID cards Card, the characteristic that can be arbitrarily changed using the sector of UID cards 0, using rolling the method for code encryption to card ID number and data command Authentication information carries out two re-encryption modifications, improves the confidentiality of user data, adds the difficulty of deciphering data, have security High, the characteristics of anti-attack ability is strong.
Brief description of the drawings
Fig. 1 is the system structure diagram of the present invention.
Fig. 2 is the flow chart of the present invention.
Embodiment
The present invention is described in further details below in conjunction with the accompanying drawings.
Referring to Fig. 1, one kind rolls code system, includes UID cards, UID cards and reader wireless connection;
Described UID cards are for memory card exclusive identification code ID number, data command and key pair;
Described reader utilizes the characteristic that the sector of UID cards 0 can arbitrarily change, and utilizes the method data for rolling code encryption Modification is encrypted in instruction authentication information.
The bidirectional identity authentication of described reader and UID cards uses the RSA cryptographic algorithms of asymmet-ric encryption method, exempts User exchanges the needs of key, increases data security.
Described rolling code, by the way that afterwards data are encrypted with modification, makes user every in each data command authentication Secondary data command information differs, and adds decoding difficulty.
It is an object of the invention to provide a kind of method of data double-encryption.Including by rivest, shamir, adelman with roll The method of code-phase combination double-encryption is used for data encryption and identification.
Referring to Fig. 2, a kind of double encryption approach based on rolling code, comprise the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:Using the ID number of UID cards and data command as data block it is sent to reader, reader will receive Data block verifies whether ID number and data command are legal compared with the data block preserved, if legal, perform and grasps in next step Make, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just without in next step Operation;
Step 4:Reader data block is encrypted modification using rolling code AES, and by amended data Block is sent to UID cards;
Step 5:The data block that UID card storages receive, and as the initialization of next data command authentication Data.
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number B, ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise Authentication not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reading Device;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, number is verified According to block;Otherwise, UID cards identification mistake.
By the concrete scheme of above-described embodiment, when system key or user data are stolen or arbitrarily distorted, Encryption method of the present invention has dual defence line, can effectively identify user identity, and the data command that user is each Identification information is different from, and be effectively prevent inflight acquisition and is palmed off the potential safety hazard of identity, adds the difficulty of deciphering data, With the characteristics of safe, anti-attack ability is strong.
Above-described embodiment is merely illustrative of the technical solution of the present invention, non-that it is limited.Although with reference to above-described embodiment pair The present invention is described in detail, and the technical staff of the industry should be understood that:It can be to the technical scheme of above-described embodiment Modify, or which part technical characteristic is replaced, but these modifications or substitutions, do not make the sheet of its technical method Matter departs from the thought and protection domain of the present invention.

Claims (1)

1. a kind of double encryption approach based on rolling code, it is characterised in that comprise the following steps:
Step 1:Reader and UID cards carry out bidirectional identity authentication by rivest, shamir, adelman;
Step 2:If legal, step 3 is carried out;Otherwise, authentication not passes through;
Step 3:The ID number of UID cards and data command are sent to reader, the data that reader will receive as data block Block verifies whether ID number and data command are legal, if legal, if legal, perform next compared with the data block preserved Step operation, including the data of validated user are checked, data modification, data calculate, otherwise, for disabled user, just under Single stepping;
Step 4:Reader data block is encrypted modification using rolling code AES, and amended data block is sent out Give UID cards;
Step 5:The data block that UID card storages receive, and as the initialization number of next data command authentication According to;
Described rivest, shamir, adelman comprises the following steps again:
1)UID cards send a random number A to reader;
2)Random number A is encrypted to form ciphertext A0 with the public key Kmu of UID cards for reader, and produces a random number B, will Ciphertext A0 and random number B are sent to UID cards;
3)UID cards are decrypted with private key Kpu to A0, and whether verification reader is legal;If legal, step 4 is carried out, otherwise identity Certification not passes through;
4)UID cards will be encrypted to form ciphertext B0 using the public key Km of reader to random number B, and be sent to reader;
5)Ciphertext B0 is decrypted using private key Kp for reader, and whether checking UID cards are legal;If legal, data block is verified; Otherwise, UID cards identification mistake.
CN201510068536.1A 2015-02-10 2015-02-10 A kind of rolling code system and the double encryption approach based on rolling code Active CN104615967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510068536.1A CN104615967B (en) 2015-02-10 2015-02-10 A kind of rolling code system and the double encryption approach based on rolling code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510068536.1A CN104615967B (en) 2015-02-10 2015-02-10 A kind of rolling code system and the double encryption approach based on rolling code

Publications (2)

Publication Number Publication Date
CN104615967A CN104615967A (en) 2015-05-13
CN104615967B true CN104615967B (en) 2017-12-01

Family

ID=53150406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510068536.1A Active CN104615967B (en) 2015-02-10 2015-02-10 A kind of rolling code system and the double encryption approach based on rolling code

Country Status (1)

Country Link
CN (1) CN104615967B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022181B (en) * 2016-05-30 2018-08-31 陕西科技大学 A kind of system for preventing IC card from stealing brush
CN106529651B (en) * 2016-11-15 2019-03-08 安徽汉威电子有限公司 A kind of radio frequency card using double-encryption algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116844A (en) * 2013-03-06 2013-05-22 李锦风 Near field communication payment method authenticated by both sides of deal
CN103150655A (en) * 2013-03-25 2013-06-12 曹鹏 Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
EP2779564A1 (en) * 2011-11-08 2014-09-17 Chan, Ka Yin Victor Method and system for authenticating user's identity and equipment used therein

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2779564A1 (en) * 2011-11-08 2014-09-17 Chan, Ka Yin Victor Method and system for authenticating user's identity and equipment used therein
CN103116844A (en) * 2013-03-06 2013-05-22 李锦风 Near field communication payment method authenticated by both sides of deal
CN103150655A (en) * 2013-03-25 2013-06-12 曹鹏 Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KEELOQ加密算法在硬件加密中的应用;李罗等;《电子技术应用》;20060930(第9期);第42页第2节 *

Also Published As

Publication number Publication date
CN104615967A (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN104217230B (en) The safety certifying method of hiding ultrahigh frequency electronic tag identifier
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
US9811478B2 (en) Self-encrypting flash drive
KR101264791B1 (en) Security certification and storage combined device having wireless communication function
CN103152174B (en) It is applied to the data processing method in parking lot, device and managing system of car parking
CA2921718C (en) Facilitating secure transactions using a contactless interface
US9065635B2 (en) Information processing apparatus, IC chip, and information processing method
ES2768963T3 (en) Entity authentication procedure and device
CN103606223B (en) A kind of card authentication method and device
CN101980241A (en) Method, system and device for authenticating radio frequency tag
CN104615967B (en) A kind of rolling code system and the double encryption approach based on rolling code
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN103971141B (en) RFID (radio frequency identification) information acquisition realization method and system
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN104579673B (en) Interactive authentication method between RFID card and card reader
CN103455768B (en) A kind of USB method for secure storing and system
KR101630462B1 (en) Apparatus and Method for Securing a Keyboard
CN105516182A (en) Bidirectional authentication method and system used between smart card and reader-writer
CN104579691A (en) BYOD mode control method, mobile device and system
CN204103935U (en) A kind of protective device being applied to banking hardware password
Li et al. Rhythmic rfid authentication
CN113988249B (en) RFID (radio frequency identification) method based on arrangement
KR101505735B1 (en) Method for Authenticating Near Field Communication Card by using Time Verification
CN104346643B (en) Based on encryption method of the aes algorithm to the 925MHz electronic vehicle license plate systems of UHF 920
KR101684905B1 (en) User authentication device for multi-authenticating by using fingerprint, security key and wireless tag

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant