CN105991283A - Encryption method applied to passive ultrahigh frequency RFID technology - Google Patents

Encryption method applied to passive ultrahigh frequency RFID technology Download PDF

Info

Publication number
CN105991283A
CN105991283A CN201510071096.5A CN201510071096A CN105991283A CN 105991283 A CN105991283 A CN 105991283A CN 201510071096 A CN201510071096 A CN 201510071096A CN 105991283 A CN105991283 A CN 105991283A
Authority
CN
China
Prior art keywords
encryption
computing
bit
rfid technology
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510071096.5A
Other languages
Chinese (zh)
Inventor
陈昊
王杨
安锡文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCCC BEIDOU TECHNOLOGY Co Ltd
Original Assignee
CCCC BEIDOU TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCCC BEIDOU TECHNOLOGY Co Ltd filed Critical CCCC BEIDOU TECHNOLOGY Co Ltd
Priority to CN201510071096.5A priority Critical patent/CN105991283A/en
Publication of CN105991283A publication Critical patent/CN105991283A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an encryption method applied to a passive ultrahigh frequency RFID technology. By using the method of the invention, a problem that performance and safety can not considered simultaneously under the passive ultrahigh frequency RFID technology. The encryption method mainly comprises two phases of RSi initialization and encryption. A core module of an algorithm is WDz. The WDz is a substitution-displacement encryption structure and comprises four S boxes capable of realizing non-linear substitution and one unit capable of realizing linear displacement. The encryption method has advantages of realizing cost, a data rate, power consumption and other aspects and is especially suitable for the passive ultrahigh frequency RFID technology.

Description

A kind of encryption method being applied to passive ultra-high frequency RFID technology
Technical field
The present invention relates to a kind of encryption method, specifically a kind of encryption method being applied to passive ultra-high frequency RFID technology.
Background technology
RFID technique is a kind of contactless automatic identification technology, and it is automatically identified destination object and obtains phase by radiofrequency signal Close data, identify that work, without manual intervention, is operable with various adverse circumstances.RFID technique can recognize that high-speed moving object simultaneously Multiple label can be identified simultaneously, swift and convenient to operate, it is used widely in society's various fields at present.
But with RFID application growing, its safety problem also gradually highlights, be vulnerable to unauthorized access, tracking, eavesdropping, Forgeries etc. are attacked.The Mifare solution of the NXP company being widely used at present repeatedly is cracked by researcher in the industry, Illustrating RFID application system, there is very big potential safety hazard in especially passive RFID technology field.As can be seen here, RFID skill Can the key whether art can successfully be promoted, be effectively solve the safety problem that this technology causes.
And in succession put into effect the 1.0th, the 2.0th, 3.0 versions now with " China's finance integrated circuit (IC) card specification " (PBOC), should Rfid system for passive HF frequency range (13.56MHz) has had great lifting in terms of security.But for passive Ultra-high frequency band (860MHz-960MHz), when it is applied to field of traffic, is subject to high speed, remote, high discrimination etc. The restriction of performance requirement, its demand for security is difficult to be satisfied.Despite utilizing the encryption system such as symmetric key AES, PKI ECC Carry out data encryption and certification, but aspect of performance is preferable not to the utmost.
Content of the invention
It is an object of the invention to provide a kind of encryption method being applied to passive ultra-high frequency RFID technology, it solves well The problem that performance and safety can not be taken into account simultaneously, is respectively provided with bigger advantage at aspects such as realizing cost, data transfer rate and power consumption, special Shi He passive ultra-high frequency RFID technology.
For achieving the above object, the present invention provides following technical scheme:
A kind of encryption method being applied to passive ultra-high frequency RFID technology, including RSiInitialization and encryption two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxExpression 16-bit initialization vector, x=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing, wherein: the binary system that the data input initializing computing is j is mended Code, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent and utilize key KyCarry out The function of cryptographic calculation, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key, y=1,2,3 ..., 8;Warp Cross WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once, fourth round computing terminates After, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing;Wherein: the data of data encryption computing Input is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encrypt the data after terminating It is output as 16-bit ciphertext CT that encryption generates;
Described WDzIt is a replacement-displacement cryptographic structure, including 4 S boxes realizing non-linear replacement and 1 realization are linearly put The unit changing.
As the further scheme of the present invention: RSiSpecific as follows in the update mode of initialization and two stages of encryption:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216 Mould add operation.
As the further scheme of the present invention: realize that the replacement relation of the S box of non-linear replacement is specific as follows:
X 0 1 2 3 4 5 6 7 8 9 A B C D E F
S1(x) 7 C E 9 2 1 5 F B 6 D 0 4 8 A 3
S2(x) 4 A 1 6 8 F 7 C 3 0 E D 5 9 B 2
S3(x) 2 F C 1 5 6 A D E 8 3 4 0 B 9 7
S4(x) F 4 5 8 9 7 2 E A 3 0 E 6 C D B
As the further scheme of the present invention: the unit realizing linear orthomorphism is: L (D)=(D < < < 6) (D < < < 10).
As the further scheme of the present invention: after encryption terminates, RSiIt again is updated, bright for 16-bit next time to be encrypted The encryption of literary composition data PT.
Compared with prior art, the invention has the beneficial effects as follows:
The security mechanism of present invention design requires, only after read write line and label two-way authentication are passed through, read write line just can be to mark Sign data in memory to be written and read, and the communication between them is carried out with ciphertext form.The data encryption side that the present invention takes Formula is to utilize a kind of New Lightweight Hummingbird (HB) encryption method, to solve performance under passive ultra-high frequency RFID technology The problem can not simultaneously taken into account with safety.Meanwhile, in order to save label cost, label only realizes the encryption of data, and not Realize deciphering.The New Lightweight Hummingbird algorithm of the present invention is the modified version of initial Hummingbird: key length Being reduced to 128bit, length of the plaintext remains 16bit;The number of internal status register is extended for 8, and removes LFSR; Add circulative shift operation to update at status register.Remain the block encryption that initial Hummingbird is possessed simultaneously Method and stream encryption method characteristic.The present invention solves performance and the problem that can not simultaneously take into account of safety well, realize cost, The aspect such as data transfer rate and power consumption is respectively provided with bigger advantage, is particularly suitable for passive ultra-high frequency RFID technology.
The present invention is in order to obtain encryption times the shortest, in the circuit design of maximum throughput rate, has instantiated four WDzModule, And by WDzFour-wheel iteration in module launches computing;The design of maximum throughput rate exchanges enciphering rate for sacrifice area.
Brief description
Fig. 1 is the initialization flowchart of the encryption method being applied to passive ultra-high frequency RFID technology.
Fig. 2 is the data encryption flow chart of the encryption method being applied to passive ultra-high frequency RFID technology.
Fig. 3 is the structure chart being applied to WD in the encryption method of passive ultra-high frequency RFID technology.
In figure, symbol description is as follows:
Symbolic name Explanation
RSi 16-bit internal status register, i=1,2,3 ..., 8
IVx 16-bit initialization vector, x=1,2,3,4
Ky The 16-bit sub-key that 128-bit key is divided into, y=1,2,3 ..., 8
WDz Key is utilized to be encrypted the function of computing, z=1,2,3,4
WDoutz Through WDzThe 16-bit output obtaining after computing, z=1,2,3,4
PT 16-bit to be encrypted is in plain text
CT The 16-bit ciphertext that encryption generates
<< Ring shift left bit manipulation
>> Ring shift right bit manipulation
Xor operation
Field 216Mould add operation
Detailed description of the invention
It is described in more detail below in conjunction with the technical scheme to this patent for the detailed description of the invention.
A kind of encryption method being applied to passive ultra-high frequency RFID technology, including RSiInitialization and encryption two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxExpression 16-bit initialization vector, x=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing (referring to Fig. 2), wherein: initialize the data input of computing For the complement of two's two's complement of j, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent profit Use key KyIt is encrypted the function of computing, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key, Y=1,2,3 ..., 8;Through WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once, After fourth round computing terminates, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing (referring to Fig. 3);Wherein: data add The data input of close computing is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encryption Data after end are output as 16-bit ciphertext CT that encryption generates;And after encryption terminates, RSiIt is again updated, for treating next time The encryption of the 16-bit clear data PT of encryption.
RSiSpecific as follows in the update mode of initialization and two stages of encryption:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216 Mould add operation.
The nucleus module of the present invention is WDz, WDzBeing a typical replacement-displacement cryptographic structure, its structure chart is as shown in Figure 3; Its main module has 4 S boxes (S1-S4) realizing non-linear replacement and 1 unit (Linear realizing linear orthomorphism transform)。
Realize that the replacement relation of the S box of non-linear replacement is specific as follows:
X 0 1 2 3 4 5 6 7 8 9 A B C D E F
S1(x) 7 C E 9 2 1 5 F B 6 D 0 4 8 A 3
S2(x) 4 A 1 6 8 F 7 C 3 0 E D 5 9 B 2
S3(x) 2 F C 1 5 6 A D E 8 3 4 0 B 9 7
S4(x) F 4 5 8 9 7 2 E A 3 0 E 6 C D B
The unit realizing linear orthomorphism is: L (D)=(D < < < 6) (D < < < 10).
In the present invention, in order to obtain encryption times the shortest, in the circuit design of maximum throughput rate, four WD are instantiatedz Module, and by WDzFour-wheel iteration in module launches computing.The design of maximum throughput rate exchanges enciphering rate for sacrifice area. So, initializing computing only needs 4 clock cycle.If n represents the number of times of encryption, total clock number of cryptographic calculation is: n+4.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention Within principle, any modification, equivalent substitution and improvement etc. done, should be included within the scope of protection of the invention.

Claims (5)

1. the encryption method being applied to passive ultra-high frequency RFID technology, it is characterised in that include RSiInitialization and encryption Two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxRepresent 16-bit initialization vector, X=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing, wherein: initialize the binary system that the data input of computing is j Complement code, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent and utilize key KyEnter The function of row cryptographic calculation, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key, y=1,2,3 ..., 8; Through WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once, fourth round computing is tied Shu Hou, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing;Wherein: the data of data encryption computing Input is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encrypt the data after terminating It is output as 16-bit ciphertext CT that encryption generates;
Described WDzIt is a replacement-displacement cryptographic structure, including 4 S boxes realizing non-linear replacement and 1 realize linear orthomorphism Unit.
2. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that RSi? Initialize and the update mode in two stages of encryption be specific as follows:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216Mould Add operation.
3. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that realize non- The replacement relation of the S box of linear substitution is specific as follows:
X 0 1 2 3 4 5 6 7 8 9 A B C D E F S1(x) 7 C E 9 2 1 5 F B 6 D 0 4 8 A 3 S2(x) 4 A 1 6 8 F 7 C 3 0 E D 5 9 B 2 S3(x) 2 F C 1 5 6 A D E 8 3 4 0 B 9 7 S4(x) F 4 5 8 9 7 2 E A 3 0 E 6 C D B
4. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that realize line Property displacement unit be: L (D)=(D < < < 6) (D < < < 10).
5. the encryption method being applied to passive ultra-high frequency RFID technology according to one of claim 1-4, it is characterised in that After encryption terminates, RSiIt is again updated, for the encryption of 16-bit clear data PT next time to be encrypted.
CN201510071096.5A 2015-02-10 2015-02-10 Encryption method applied to passive ultrahigh frequency RFID technology Pending CN105991283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510071096.5A CN105991283A (en) 2015-02-10 2015-02-10 Encryption method applied to passive ultrahigh frequency RFID technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510071096.5A CN105991283A (en) 2015-02-10 2015-02-10 Encryption method applied to passive ultrahigh frequency RFID technology

Publications (1)

Publication Number Publication Date
CN105991283A true CN105991283A (en) 2016-10-05

Family

ID=57041646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510071096.5A Pending CN105991283A (en) 2015-02-10 2015-02-10 Encryption method applied to passive ultrahigh frequency RFID technology

Country Status (1)

Country Link
CN (1) CN105991283A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122341A (en) * 2010-12-27 2011-07-13 北京中电华大电子设计有限责任公司 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag
US20120008767A1 (en) * 2005-08-01 2012-01-12 Eric Myron Smith System for encrypting and decrypting a plaintext message with authentication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120008767A1 (en) * 2005-08-01 2012-01-12 Eric Myron Smith System for encrypting and decrypting a plaintext message with authentication
CN102122341A (en) * 2010-12-27 2011-07-13 北京中电华大电子设计有限责任公司 Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖梦琴: "基于HB算法的超高频RFID安全标签的研究与设计", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Similar Documents

Publication Publication Date Title
TWI744388B (en) Method and system for generation of cipher round keys by bit-mixers
CN101626289B (en) Design method of AES encryption chip and computer encryptor
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN101086769B (en) Encrypting system for encrypting input data and operation method
US10176121B2 (en) Apparatus and method for memory address encryption
CN104639314A (en) Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method
CN109245881A (en) A kind of photograph video cloud encryption storage method
CN102970132B (en) Protection method for preventing power analysis and electromagnetic radiation analysis on grouping algorithm
CN101739889A (en) Cryptographic processing apparatus
US9961057B2 (en) Securing a cryptographic device against implementation attacks
Deshpande et al. Efficient implementation of AES algorithm on FPGA
CN103095449B (en) A kind of dynamic encryption decryption method based on stream cipher
JP2009175167A (en) Data converting device, data converting method, and computer program
CN103503362A (en) Data processing device, data processing method, and program
CN107534549B (en) Readable storage medium, method and system for encrypting data stream block
CN101431405B (en) DES encrypted method and its hardware circuit implementing method
CN106487499A (en) The protection of Rijndael algorithm
CN108206736A (en) A kind of lightweight cryptographic algorithm HBcipher implementation methods and device
CN103746796A (en) Coprocessor for realizing intelligent card SM4 password algorithm
CN107306180A (en) Ciphering and deciphering device and its power analysis defence method
CN106982116A (en) A kind of local file encryption method of the AES based on reversible logic circuits
Christy et al. FPGA implementation of AES algorithm using Composite Field Arithmetic
CN103873229B (en) Rapid protection method for resisting timing and cache side channel attack under KLEIN encryption AVR environment
CN105991283A (en) Encryption method applied to passive ultrahigh frequency RFID technology
CN104393988A (en) Reversible data encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005

RJ01 Rejection of invention patent application after publication