CN105991283A - Encryption method applied to passive ultrahigh frequency RFID technology - Google Patents
Encryption method applied to passive ultrahigh frequency RFID technology Download PDFInfo
- Publication number
- CN105991283A CN105991283A CN201510071096.5A CN201510071096A CN105991283A CN 105991283 A CN105991283 A CN 105991283A CN 201510071096 A CN201510071096 A CN 201510071096A CN 105991283 A CN105991283 A CN 105991283A
- Authority
- CN
- China
- Prior art keywords
- encryption
- computing
- bit
- rfid technology
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses an encryption method applied to a passive ultrahigh frequency RFID technology. By using the method of the invention, a problem that performance and safety can not considered simultaneously under the passive ultrahigh frequency RFID technology. The encryption method mainly comprises two phases of RSi initialization and encryption. A core module of an algorithm is WDz. The WDz is a substitution-displacement encryption structure and comprises four S boxes capable of realizing non-linear substitution and one unit capable of realizing linear displacement. The encryption method has advantages of realizing cost, a data rate, power consumption and other aspects and is especially suitable for the passive ultrahigh frequency RFID technology.
Description
Technical field
The present invention relates to a kind of encryption method, specifically a kind of encryption method being applied to passive ultra-high frequency RFID technology.
Background technology
RFID technique is a kind of contactless automatic identification technology, and it is automatically identified destination object and obtains phase by radiofrequency signal
Close data, identify that work, without manual intervention, is operable with various adverse circumstances.RFID technique can recognize that high-speed moving object simultaneously
Multiple label can be identified simultaneously, swift and convenient to operate, it is used widely in society's various fields at present.
But with RFID application growing, its safety problem also gradually highlights, be vulnerable to unauthorized access, tracking, eavesdropping,
Forgeries etc. are attacked.The Mifare solution of the NXP company being widely used at present repeatedly is cracked by researcher in the industry,
Illustrating RFID application system, there is very big potential safety hazard in especially passive RFID technology field.As can be seen here, RFID skill
Can the key whether art can successfully be promoted, be effectively solve the safety problem that this technology causes.
And in succession put into effect the 1.0th, the 2.0th, 3.0 versions now with " China's finance integrated circuit (IC) card specification " (PBOC), should
Rfid system for passive HF frequency range (13.56MHz) has had great lifting in terms of security.But for passive
Ultra-high frequency band (860MHz-960MHz), when it is applied to field of traffic, is subject to high speed, remote, high discrimination etc.
The restriction of performance requirement, its demand for security is difficult to be satisfied.Despite utilizing the encryption system such as symmetric key AES, PKI ECC
Carry out data encryption and certification, but aspect of performance is preferable not to the utmost.
Content of the invention
It is an object of the invention to provide a kind of encryption method being applied to passive ultra-high frequency RFID technology, it solves well
The problem that performance and safety can not be taken into account simultaneously, is respectively provided with bigger advantage at aspects such as realizing cost, data transfer rate and power consumption, special
Shi He passive ultra-high frequency RFID technology.
For achieving the above object, the present invention provides following technical scheme:
A kind of encryption method being applied to passive ultra-high frequency RFID technology, including RSiInitialization and encryption two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxExpression 16-bit initialization vector, x=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing, wherein: the binary system that the data input initializing computing is j is mended
Code, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent and utilize key KyCarry out
The function of cryptographic calculation, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key, y=1,2,3 ..., 8;Warp
Cross WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once, fourth round computing terminates
After, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing;Wherein: the data of data encryption computing
Input is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encrypt the data after terminating
It is output as 16-bit ciphertext CT that encryption generates;
Described WDzIt is a replacement-displacement cryptographic structure, including 4 S boxes realizing non-linear replacement and 1 realization are linearly put
The unit changing.
As the further scheme of the present invention: RSiSpecific as follows in the update mode of initialization and two stages of encryption:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216
Mould add operation.
As the further scheme of the present invention: realize that the replacement relation of the S box of non-linear replacement is specific as follows:
X | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
S1(x) | 7 | C | E | 9 | 2 | 1 | 5 | F | B | 6 | D | 0 | 4 | 8 | A | 3 |
S2(x) | 4 | A | 1 | 6 | 8 | F | 7 | C | 3 | 0 | E | D | 5 | 9 | B | 2 |
S3(x) | 2 | F | C | 1 | 5 | 6 | A | D | E | 8 | 3 | 4 | 0 | B | 9 | 7 |
S4(x) | F | 4 | 5 | 8 | 9 | 7 | 2 | E | A | 3 | 0 | E | 6 | C | D | B |
。
As the further scheme of the present invention: the unit realizing linear orthomorphism is: L (D)=(D < < < 6) (D < < < 10).
As the further scheme of the present invention: after encryption terminates, RSiIt again is updated, bright for 16-bit next time to be encrypted
The encryption of literary composition data PT.
Compared with prior art, the invention has the beneficial effects as follows:
The security mechanism of present invention design requires, only after read write line and label two-way authentication are passed through, read write line just can be to mark
Sign data in memory to be written and read, and the communication between them is carried out with ciphertext form.The data encryption side that the present invention takes
Formula is to utilize a kind of New Lightweight Hummingbird (HB) encryption method, to solve performance under passive ultra-high frequency RFID technology
The problem can not simultaneously taken into account with safety.Meanwhile, in order to save label cost, label only realizes the encryption of data, and not
Realize deciphering.The New Lightweight Hummingbird algorithm of the present invention is the modified version of initial Hummingbird: key length
Being reduced to 128bit, length of the plaintext remains 16bit;The number of internal status register is extended for 8, and removes LFSR;
Add circulative shift operation to update at status register.Remain the block encryption that initial Hummingbird is possessed simultaneously
Method and stream encryption method characteristic.The present invention solves performance and the problem that can not simultaneously take into account of safety well, realize cost,
The aspect such as data transfer rate and power consumption is respectively provided with bigger advantage, is particularly suitable for passive ultra-high frequency RFID technology.
The present invention is in order to obtain encryption times the shortest, in the circuit design of maximum throughput rate, has instantiated four WDzModule,
And by WDzFour-wheel iteration in module launches computing;The design of maximum throughput rate exchanges enciphering rate for sacrifice area.
Brief description
Fig. 1 is the initialization flowchart of the encryption method being applied to passive ultra-high frequency RFID technology.
Fig. 2 is the data encryption flow chart of the encryption method being applied to passive ultra-high frequency RFID technology.
Fig. 3 is the structure chart being applied to WD in the encryption method of passive ultra-high frequency RFID technology.
In figure, symbol description is as follows:
Symbolic name | Explanation |
RSi | 16-bit internal status register, i=1,2,3 ..., 8 |
IVx | 16-bit initialization vector, x=1,2,3,4 |
Ky | The 16-bit sub-key that 128-bit key is divided into, y=1,2,3 ..., 8 |
WDz | Key is utilized to be encrypted the function of computing, z=1,2,3,4 |
WDoutz | Through WDzThe 16-bit output obtaining after computing, z=1,2,3,4 |
PT | 16-bit to be encrypted is in plain text |
CT | The 16-bit ciphertext that encryption generates |
<< | Ring shift left bit manipulation |
>> | Ring shift right bit manipulation |
⊕ | Xor operation |
Field | 216Mould add operation |
Detailed description of the invention
It is described in more detail below in conjunction with the technical scheme to this patent for the detailed description of the invention.
A kind of encryption method being applied to passive ultra-high frequency RFID technology, including RSiInitialization and encryption two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxExpression 16-bit initialization vector, x=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing (referring to Fig. 2), wherein: initialize the data input of computing
For the complement of two's two's complement of j, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent profit
Use key KyIt is encrypted the function of computing, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key,
Y=1,2,3 ..., 8;Through WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once,
After fourth round computing terminates, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing (referring to Fig. 3);Wherein: data add
The data input of close computing is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encryption
Data after end are output as 16-bit ciphertext CT that encryption generates;And after encryption terminates, RSiIt is again updated, for treating next time
The encryption of the 16-bit clear data PT of encryption.
RSiSpecific as follows in the update mode of initialization and two stages of encryption:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216
Mould add operation.
The nucleus module of the present invention is WDz, WDzBeing a typical replacement-displacement cryptographic structure, its structure chart is as shown in Figure 3;
Its main module has 4 S boxes (S1-S4) realizing non-linear replacement and 1 unit (Linear realizing linear orthomorphism
transform)。
Realize that the replacement relation of the S box of non-linear replacement is specific as follows:
X | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F |
S1(x) | 7 | C | E | 9 | 2 | 1 | 5 | F | B | 6 | D | 0 | 4 | 8 | A | 3 |
S2(x) | 4 | A | 1 | 6 | 8 | F | 7 | C | 3 | 0 | E | D | 5 | 9 | B | 2 |
S3(x) | 2 | F | C | 1 | 5 | 6 | A | D | E | 8 | 3 | 4 | 0 | B | 9 | 7 |
S4(x) | F | 4 | 5 | 8 | 9 | 7 | 2 | E | A | 3 | 0 | E | 6 | C | D | B |
The unit realizing linear orthomorphism is: L (D)=(D < < < 6) (D < < < 10).
In the present invention, in order to obtain encryption times the shortest, in the circuit design of maximum throughput rate, four WD are instantiatedz
Module, and by WDzFour-wheel iteration in module launches computing.The design of maximum throughput rate exchanges enciphering rate for sacrifice area.
So, initializing computing only needs 4 clock cycle.If n represents the number of times of encryption, total clock number of cryptographic calculation is: n+4.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention
Within principle, any modification, equivalent substitution and improvement etc. done, should be included within the scope of protection of the invention.
Claims (5)
1. the encryption method being applied to passive ultra-high frequency RFID technology, it is characterised in that include RSiInitialization and encryption
Two stages;
RSiInitial phase:
First, RSiIt is loaded into IVx, loading mode is:
{RS1,RS2,RS3,RS4,RS5,RS6,RS7,RS8}={ IV1,IV2,IV3,IV4,IV1,IV2,IV3,IV4};
Wherein: RSiExpression 16-bit internal status register, i=1,2,3 ..., 8;IVxRepresent 16-bit initialization vector,
X=1,2,3,4;
Then it is loaded into IVxAfter RSiCarry out four-wheel and initialize computing, wherein: initialize the binary system that the data input of computing is j
Complement code, j represents the wheel number of computing, j=0,1,2,3;The function initializing computing employing is WDz,WDzRepresent and utilize key KyEnter
The function of row cryptographic calculation, z=1,2,3,4;Key KyThe 16-bit sub-key being divided into for 128-bit key, y=1,2,3 ..., 8;
Through WDzThe 16-bit output WD obtaining after computingoutz;Often take turns computing to terminate, RSiWill be updated once, fourth round computing is tied
Shu Hou, RSiIn value be exactly initialize after value;
RSiEncrypting stage: RSiValue after initialization carries out taking turns data encryption computing;Wherein: the data of data encryption computing
Input is 16-bit clear data PT to be encrypted, and the function that data encryption computing uses also is WDz, encrypt the data after terminating
It is output as 16-bit ciphertext CT that encryption generates;
Described WDzIt is a replacement-displacement cryptographic structure, including 4 S boxes realizing non-linear replacement and 1 realize linear orthomorphism
Unit.
2. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that RSi?
Initialize and the update mode in two stages of encryption be specific as follows:
Wherein:<<representing ring shift left bit manipulation,>>represents ring shift right bit manipulation, represents xor operation, and field represents 216Mould
Add operation.
3. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that realize non-
The replacement relation of the S box of linear substitution is specific as follows:
。
4. the encryption method being applied to passive ultra-high frequency RFID technology according to claim 1, it is characterised in that realize line
Property displacement unit be: L (D)=(D < < < 6) (D < < < 10).
5. the encryption method being applied to passive ultra-high frequency RFID technology according to one of claim 1-4, it is characterised in that
After encryption terminates, RSiIt is again updated, for the encryption of 16-bit clear data PT next time to be encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510071096.5A CN105991283A (en) | 2015-02-10 | 2015-02-10 | Encryption method applied to passive ultrahigh frequency RFID technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510071096.5A CN105991283A (en) | 2015-02-10 | 2015-02-10 | Encryption method applied to passive ultrahigh frequency RFID technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105991283A true CN105991283A (en) | 2016-10-05 |
Family
ID=57041646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510071096.5A Pending CN105991283A (en) | 2015-02-10 | 2015-02-10 | Encryption method applied to passive ultrahigh frequency RFID technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991283A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102122341A (en) * | 2010-12-27 | 2011-07-13 | 北京中电华大电子设计有限责任公司 | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag |
US20120008767A1 (en) * | 2005-08-01 | 2012-01-12 | Eric Myron Smith | System for encrypting and decrypting a plaintext message with authentication |
-
2015
- 2015-02-10 CN CN201510071096.5A patent/CN105991283A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120008767A1 (en) * | 2005-08-01 | 2012-01-12 | Eric Myron Smith | System for encrypting and decrypting a plaintext message with authentication |
CN102122341A (en) * | 2010-12-27 | 2011-07-13 | 北京中电华大电子设计有限责任公司 | Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag |
Non-Patent Citations (1)
Title |
---|
肖梦琴: "基于HB算法的超高频RFID安全标签的研究与设计", 《中国优秀硕士学位论文全文数据库(电子期刊)》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI744388B (en) | Method and system for generation of cipher round keys by bit-mixers | |
CN101626289B (en) | Design method of AES encryption chip and computer encryptor | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN101086769B (en) | Encrypting system for encrypting input data and operation method | |
US10176121B2 (en) | Apparatus and method for memory address encryption | |
CN104639314A (en) | Device based on AES (advanced encryption standard) encryption/decryption algorithm and pipelining control method | |
CN109245881A (en) | A kind of photograph video cloud encryption storage method | |
CN102970132B (en) | Protection method for preventing power analysis and electromagnetic radiation analysis on grouping algorithm | |
CN101739889A (en) | Cryptographic processing apparatus | |
US9961057B2 (en) | Securing a cryptographic device against implementation attacks | |
Deshpande et al. | Efficient implementation of AES algorithm on FPGA | |
CN103095449B (en) | A kind of dynamic encryption decryption method based on stream cipher | |
JP2009175167A (en) | Data converting device, data converting method, and computer program | |
CN103503362A (en) | Data processing device, data processing method, and program | |
CN107534549B (en) | Readable storage medium, method and system for encrypting data stream block | |
CN101431405B (en) | DES encrypted method and its hardware circuit implementing method | |
CN106487499A (en) | The protection of Rijndael algorithm | |
CN108206736A (en) | A kind of lightweight cryptographic algorithm HBcipher implementation methods and device | |
CN103746796A (en) | Coprocessor for realizing intelligent card SM4 password algorithm | |
CN107306180A (en) | Ciphering and deciphering device and its power analysis defence method | |
CN106982116A (en) | A kind of local file encryption method of the AES based on reversible logic circuits | |
Christy et al. | FPGA implementation of AES algorithm using Composite Field Arithmetic | |
CN103873229B (en) | Rapid protection method for resisting timing and cache side channel attack under KLEIN encryption AVR environment | |
CN105991283A (en) | Encryption method applied to passive ultrahigh frequency RFID technology | |
CN104393988A (en) | Reversible data encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161005 |
|
RJ01 | Rejection of invention patent application after publication |