CN106203579A - A kind of safe RFID label tag random number automatic update method - Google Patents

A kind of safe RFID label tag random number automatic update method Download PDF

Info

Publication number
CN106203579A
CN106203579A CN201610513299.XA CN201610513299A CN106203579A CN 106203579 A CN106203579 A CN 106203579A CN 201610513299 A CN201610513299 A CN 201610513299A CN 106203579 A CN106203579 A CN 106203579A
Authority
CN
China
Prior art keywords
random number
label
new
tag
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610513299.XA
Other languages
Chinese (zh)
Inventor
欧毓毅
魏棉裕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610513299.XA priority Critical patent/CN106203579A/en
Publication of CN106203579A publication Critical patent/CN106203579A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07318Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

RFID认证方法要具备抵抗跟踪攻击的能力,不能仅仅靠简单的密钥更新来实现,还需在标签中生成随机数,并将随机数加入到认证过程传输信息的计算中。但随机数的产生器会导致标签的设计复杂度与成本增加,因此,设计一个随机数自动更新方法具有重要的研究意义和使用价值。本发明提出一种安全的RFID标签随机数自动更新方法取代传统的随机数产生器,并将随机数加入到认证过程传输信息的计算中,保证RFID标签在每一次认证时的反馈信息都是不一样的,从而起到标签防跟踪的作用。该随机数自动更新方法基于标签中原本带有的加密算法,如HASH、MIXBITS、Rabin等等。该方法解决了目前RFID系统中标签制作成本高的问题,同时提高了RFID认证的安全性和认证效率。

The RFID authentication method must have the ability to resist tracking attacks. It cannot be realized only by simple key update, but also needs to generate random numbers in the tag, and add the random numbers to the calculation of the information transmitted during the authentication process. However, the random number generator will increase the design complexity and cost of the label. Therefore, designing a random number automatic update method has important research significance and use value. The present invention proposes a safe method for automatically updating random numbers of RFID tags to replace traditional random number generators, and adds random numbers to the calculation of transmission information in the authentication process to ensure that the feedback information of RFID tags in each authentication is accurate. The same, so as to play the role of tag anti-tracking. The random number automatic update method is based on the original encryption algorithm in the tag, such as HASH, MIXBITS, Rabin and so on. The method solves the problem of high label production cost in the current RFID system, and simultaneously improves the security and authentication efficiency of RFID authentication.

Description

一种安全的RFID标签随机数自动更新方法A Safe Automatic Update Method of RFID Tag Random Number

技术领域technical field

本发明涉及射频识别研究领域,具体涉及一种安全的RFID系统中标签随机数的自动更新方法,其中随机数用于RFID认证过程中传输信息的计算。The invention relates to the field of radio frequency identification research, in particular to a method for automatically updating tag random numbers in a safe RFID system, wherein the random numbers are used for the calculation of transmission information in the RFID authentication process.

背景技术Background technique

无线射频识别技术(radio frequency identification,RFID)是一种利用射频信号实现无接触信息传输,并通过所传输的信息来实现认证与识别目的的技术。随着RFID的普及,对RFID标签的规格、成本与性能要求越来越高,尺寸小、成本低、性能高且安全性高称为衡量RFID系统质量的标准。Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to achieve contactless information transmission, and uses the transmitted information to achieve authentication and identification purposes. With the popularization of RFID, the specifications, cost and performance requirements of RFID tags are getting higher and higher. Small size, low cost, high performance and high security are called standards for measuring the quality of RFID systems.

RFID系统通常包括后端服务器系统、RFID读写器、RFID标签三部分。由于标签的处理能力受限,且人们很难感知射频信号的非法读取,导致RFID读写器与RFID标签之间的通信存在安全与隐私隐患,容易受到各种安全攻击的威胁。为了抵抗跟踪攻击,Godor G等人提出了标签信息更新的认证方案,但方案不能抵制去同步化攻击,攻击者可以通过重放消息,使读写器与标签两者之间的密钥不一致,从而破坏两者之间的后续认证(Godor G,ImreS.Hash-based mutual authentication protocol for low-cost RFID systems[C]//Proc of the 18th EUNICE Conf on Information and CommunicationsTechnologies.Berlin:Springer,2012:76-87.);Zhou等人基于物理不可克隆函数(Physically Unclonable Function,PUF)提出一种安全认证协议,在标签中加入了随机数产生器来保证标签反馈信息的新鲜性,从而具备抵抗跟踪攻击能力,但随机数产生器的加入使得标签的成本大大增加(Zhou Enhui,Liu Yana.Physically unclonable functionbased high performance privacy protection algorithm of RFID network[J].Application of Electronic Technique,2016,42(3):98-101.);Shen等人基于非线性函数MIXBITS提出一种安全RFID认证协议,同样是在标签中加入随机数产生器来保证标签反馈信息的不唯一性,起到抵抗跟踪作用,但同样的问题就是在标签中加入了随机数产生器使得标签的成本带来不少压力(Shen Jinwei,Ling Jie.An improved ultra-lightweightRFID authentication protocol[J].Computer Applications and Software,2015,32(2):304-306.);MA等人基于Rabin加密算法提出一种RFID双向认证的方法,通过更新秘钥信息来保证标签反馈信息的新鲜性,但依然易受跟踪攻击和去同步化攻击(MA Yuanjia,LIU Daowei.Improved mutual authentication with backward security for RFIDprotocols[J].Computer Engineering and Applications,2016,3,2:1-5.)。基于上面的叙述可知,RFID认证方法要具备抵抗跟踪攻击的能力,不能仅仅靠简单的密钥更新来实现,还需在标签中生成随机数,并将随机数加入到认证过程传输信息的计算中。但随机数的产生器会导致标签的设计复杂度与成本增加,因此,设计一个随机数自动更新方法具有重要的研究意义和使用价值。An RFID system usually includes three parts: a back-end server system, an RFID reader, and an RFID tag. Due to the limited processing power of the tag and the fact that it is difficult for people to perceive the illegal reading of the radio frequency signal, the communication between the RFID reader and the RFID tag has security and privacy risks, and is vulnerable to various security attacks. In order to resist tracking attacks, Godor G et al. proposed an authentication scheme for updating tag information, but the scheme cannot resist desynchronization attacks. The attacker can make the key between the reader and the tag inconsistent by replaying the message. Thereby destroying the subsequent authentication between the two (Godor G, Imre S. Hash-based mutual authentication protocol for low-cost RFID systems [C]//Proc of the 18th EUNICE Conf on Information and Communications Technologies. Berlin: Springer, 2012: 76 -87.); Zhou et al. proposed a security authentication protocol based on Physically Unclonable Function (PUF), and added a random number generator to the tag to ensure the freshness of the tag feedback information, thus resisting tracking attacks capabilities, but the addition of random number generators greatly increases the cost of tags (Zhou Enhui, Liu Yana.Physically unclonable function based high performance privacy protection algorithm of RFID network[J].Application of Electronic Technique,2016,42(3):98 -101.); Shen et al. proposed a secure RFID authentication protocol based on the nonlinear function MIXBITS, which also added a random number generator to the label to ensure the non-uniqueness of the label feedback information and play a role in resisting tracking, but the same The problem is that adding a random number generator to the tag brings a lot of pressure on the cost of the tag (Shen Jinwei, Ling Jie. An improved ultra-lightweight RFID authentication protocol [J]. Computer Applications and Software, 2015, 32 (2): 304-306.); MA et al. proposed a RFID two-way authentication method based on the Rabin encryption algorithm, which ensures the freshness of the tag feedback information by updating the secret key information, but is still vulnerable to tracking attacks and desynchronization attacks (MA Yuanjia ,LIU Daowei.Improved mutual authentication with backward security for RFIDprotocols[J].Com Puter Engineering and Applications, 2016, 3, 2: 1-5.). Based on the above description, it can be seen that the RFID authentication method must have the ability to resist tracking attacks, and it cannot be realized only by simple key update, but also needs to generate random numbers in the label, and add the random numbers to the calculation of the information transmitted during the authentication process. . However, the random number generator will increase the design complexity and cost of the label. Therefore, designing a random number automatic update method has important research significance and use value.

发明内容Contents of the invention

本发明的目的在于克服现有技术的缺点和不足,提出一种安全的RFID标签随机数自动更新方法取代传统的随机数产生器,并将随机数加入到认证过程传输信息的计算中,保证RFID标签在每一次认证时的反馈信息都是不一样的,从而起到标签防跟踪的作用。该随机数自动更新方法基于标签中原本带有的加密算法,如HASH、MIXBITS、Rabin等等。该方法解决了目前RFID系统中标签制作成本高的问题,同时提高了RFID认证的安全性和认证效率。The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, propose a safe RFID tag random number automatic update method to replace the traditional random number generator, and add the random number to the calculation of the transmission information in the authentication process to ensure RFID The feedback information of the label in each authentication is different, so as to play the role of anti-tracking of the label. The random number automatic update method is based on the original encryption algorithm in the tag, such as HASH, MIXBITS, Rabin and so on. The method solves the problem of high label production cost in the current RFID system, and simultaneously improves the security and authentication efficiency of RFID authentication.

一种安全的RFID标签随机数自动更新方法,包含于以下步骤:A safe RFID tag random number automatic update method is included in the following steps:

(1)读写器认证标签后产生随机数保存在标签中;(1) After the reader authenticates the tag, a random number is generated and stored in the tag;

(2)标签保存读写器传来的随机数,并将参数tK置1表示合法更新;(2) The tag saves the random number sent by the reader, and sets the parameter tK to 1 to indicate a legal update;

(3)读写器向标签发送请求;(3) The reader sends a request to the tag;

(4)标签收到读写器请求时,对参数tK进行判断,若tK=1,进入步骤(6),若tK=0,进入步骤(5);(4) When the tag receives the reader-writer request, it judges the parameter tK, if tK=1, enters step (6), if tK=0, enters step (5);

(5)使用加密算法对随机数进行加密运算,起到更新作用,同时将tK置0;(5) Use an encryption algorithm to encrypt the random number to play an update role, and set tK to 0 at the same time;

(6)将随机数应用于该次认证过程,并进行后续动作。(6) Apply the random number to the authentication process, and perform follow-up actions.

读写器具备随机数产生能力,标签具备存储随机数能力,以及修改参数tK能力。The reader has the ability to generate random numbers, and the tag has the ability to store random numbers and modify the parameter tK.

读写器向读写区域内的标签发送请求之后,标签会对参数tK的值进行判别,并能够执行加密算法运算。After the reader-writer sends a request to the tag in the read-write area, the tag will judge the value of the parameter tK and be able to perform encryption algorithm operations.

标签在执行加密算法运算时可以选择所需的加密内容,加密完成后会对tK的值进行修改。The tag can choose the required encrypted content when performing the encryption algorithm operation, and the value of tK will be modified after the encryption is completed.

认证完成后标签在收到更新内容时有能力执行随机数的更新步骤。After the authentication is completed, the tag has the ability to perform the update step of the random number when receiving the updated content.

本发明的RFID标签随机数自动更新方法具有如下优点和有益效果:The method for automatically updating the random number of the RFID tag of the present invention has the following advantages and beneficial effects:

(1)本发明抛弃了传统的随机数产生器,采用标签中自带的加密算法对随机数进行更新,与加密算法使用了同一组门电路,大大节约了标签的设计成本,同时也简化了标签的设计的复杂度;(1) The present invention abandons the traditional random number generator, uses the encryption algorithm in the label to update the random number, and uses the same set of gate circuits as the encryption algorithm, which greatly saves the design cost of the label and simplifies the complexity of the design of the label;

(2)本发明中使用到的加密算法是经过安全证明的,具有极高的安全性,而且加密算法并不会出现重复结果,完全满足新鲜性的需求;(2) The encryption algorithm used in the present invention is through security proof, has extremely high security, and encryption algorithm can not appear duplicate result, fully meets the requirement of freshness;

(3)在本发明中,每次合法认证后都会对标签中的随机数进行合法更新,类似随机数格式化,减少前后随机数的代数关联;(3) In the present invention, after each legal authentication, the random number in the label will be legally updated, similar to the format of the random number, reducing the algebraic association of the random number before and after;

(4)本发明保证了标签反馈信息的新鲜性,进而提高了RFID认证协议的安全性,使认证完全能够抵抗跟踪攻击。(4) The present invention ensures the freshness of the tag feedback information, further improves the security of the RFID authentication protocol, and makes the authentication fully resistant to tracking attacks.

附图说明Description of drawings

图1随机数自动更新原理图;Fig. 1 Schematic diagram of random number automatic update;

图2实例中随机数自动更新图;The random number automatic update diagram in the example in Figure 2;

图3更新方法的应用实例图。Figure 3 is an application example diagram of the update method.

具体实施方式detailed description

下面结合应用实例附图对本发明作进一步的详细描述,该实例中所使用的是Rabin加密算法,Shamir A.已经对该加密算法进行过安全性证明(Shamir A.SQUASH-A newMAC with provable security properties for highly constrained devices such asRFID tags[C]//Proc of Fast Software Encryption.Berlin:Springer,2008:144-157)。但本发明的实施方法不仅限于此。Below in conjunction with application example accompanying drawing, the present invention is described in further detail, what used in this example is Rabin encryption algorithm, Shamir A. has carried out security proof (Shamir A.SQUASH-A newMAC with provable security properties) to this encryption algorithm for highly constrained devices such asRFID tags[C]//Proc of Fast Software Encryption. Berlin: Springer, 2008: 144-157). However, the implementation method of the present invention is not limited thereto.

本发明通过以下步骤实现,如图1:The present invention is realized through the following steps, as shown in Figure 1:

(1)标签初始化阶段保存两个长度为L随机数Rnew和Rold,并保存tK=1表示随机数合法更新(tK=0表示随机数未合法更新)。其中Rnew在下次认证时当做标签随机数使用,而每次合法认证后Rnew和Rold都会进行更新,但无需在读写器中保存;(1) In the tag initialization stage, two random numbers R new and R old with a length of L are saved, and tK=1 means that the random number is legally updated (tK=0 means that the random number is not legally updated). Among them, R new will be used as a label random number in the next authentication, and R new and R old will be updated after each legal authentication, but there is no need to save it in the reader;

(2)当读写器向标签发送请求时,标签首先会判断随机数是否合法更新,即判断tK是否等于1。若tK=1,则将其置0并使用Rnew作为正常随机数使用;若tK=0,则说明上一次认证出现异常,此时会使用标签中用于加密的函数F对原先保存的随机数Rnew和Rold进行加密运算Rnew'=F<Rnew,Rold>,并作为本次的随机数使用,而原来的Rnew则赋值给Rold(2) When the reader/writer sends a request to the tag, the tag will first judge whether the random number is legally updated, that is, judge whether tK is equal to 1. If tK=1, set it to 0 and use R new as a normal random number; if tK=0, it means that there was an exception in the last authentication. The numbers R new and R old are encrypted, R new '=F<R new , R old >, and used as the random number this time, while the original R new is assigned to R old ;

(3)每次合法认证后读写器会产生长度为L的随机数Rnew'发送到标签中更新Rnew,并将上一次的Rnew赋值给Rold,同时将tK置1表示合法更新随机数。(3) After each legal authentication, the reader will generate a random number R new ' of length L and send it to the tag to update R new , and assign the last R new to R old , and set tK to 1 to indicate a legal update random number.

所述的步骤(2)中的加密函数F,最优的方案是选择单向的加密函数,即无法通过密文推出明文。事实上传统的双向加密算法设计复杂、功耗大,并不适合在轻量级RFID标签中使用。加密函数F的输出必须是规定的L位。目前满足该要求的高安全性的算法有HASH函数、MIXBITS函数和Rabin函数等等。For the encryption function F in the step (2), the optimal solution is to choose a one-way encryption function, that is, the plaintext cannot be deduced through the ciphertext. In fact, the traditional two-way encryption algorithm is complex in design and consumes a lot of power, which is not suitable for use in lightweight RFID tags. The output of the encryption function F must be the specified L bits. At present, the high-security algorithms that meet this requirement include HASH function, MIXBITS function, Rabin function and so on.

参见附图2、3,首先给出本实例所述方法中涉及到的各个符号的含义:Referring to accompanying drawing 2,3, at first provide the implication of each symbol involved in the method described in this example:

R:读写器;R: reader;

T:标签;T: label;

KEY:标签与读写器之间的共享密钥,长度为L;KEY: The shared key between the tag and the reader, the length is L;

KEYold:上一次认证使用的共享密钥;KEY old : the shared key used in the last authentication;

KEYnew:本次认证使用的共享密钥;KEY new : the shared key used in this authentication;

ID:标签的唯一标识符,与密文形式存储,长度为2L;ID: the unique identifier of the tag, stored in ciphertext, with a length of 2L;

ID_L:ID的左半部分;ID_L: the left half of the ID;

ID_R:ID的右半部分;ID_R: the right half of the ID;

r1,r2:读写器在发送请求时生成的随机数;r1, r2: the random number generated by the reader when sending the request;

Rnew:读写器每次在确定标签合法后产生的随机数,保存在标签中;R new : The reader generates a random number each time the tag is legal, and saves it in the tag;

Rold:标签中生一次使用的随机数,用于更新随机数RnewR old : The random number used once in the label is used to update the random number R new ;

Rabin<X>:单向加密算法,Rabin<X>=[X2mod M]L,其中X为加密内容,M为模数,[]L为取运算结果的前L位;Rabin<X>: one-way encryption algorithm, Rabin<X>=[X 2 mod M] L , where X is the encrypted content, M is the modulus, and [] L is the first L bits of the operation result;

M:模数,M=2L-1;M: modulus, M=2 L -1;

XOR:异或运算;XOR: Exclusive OR operation;

&:与运算。&: AND operation.

在给出详细解释之前,先给出假设:由于RFID系统读写器与后端服务器系统之间的传输方式通常为有线传输,因而默认两者之间的传输是安全的,并把两者看做一个整体。如图2所示,下面对实例进行详细说明:Before giving a detailed explanation, a hypothesis is given: Since the transmission mode between the RFID system reader and the back-end server system is usually wired transmission, the transmission between the two is safe by default, and the two are viewed as make a whole. As shown in Figure 2, the following is a detailed description of the example:

消息①:Query,A=XOR<ID_L,r1>,B=XOR<ID_R,r2>Message ①: Query, A=XOR<ID_L, r1>, B=XOR<ID_R, r2>

读写器产生随机数r1和r2,计算出A=XOR<ID_L,r1>和B=XOR<ID_R,r2>,与认证请求一并发送给标签。标签收到A和B后,结合自身保存的标签编码ID_L和ID_R提取r1=XOR<ID_L,A>和r2=XOR<ID_R,B>;同时判断tK是否等于1,若tK=1,则将tK置0后并计算C=Rabin<KEY,r1,r2,Rnew>和D=XOR<r1,r2,Rnew>发送到读写器;否则使用随机数自动更新方法对Rnew进行更新,再计算C和D发送给阅读器。在这里计算出的C和D都包含有Rnew,保证了标签反馈信息的新鲜性,进而具备抗跟踪攻击能力。The reader generates random numbers r1 and r2, calculates A=XOR<ID_L, r1> and B=XOR<ID_R, r2>, and sends them to the tag together with the authentication request. After receiving A and B, the tag extracts r1=XOR<ID_L,A> and r2=XOR<ID_R,B> in combination with the tag codes ID_L and ID_R saved by itself; at the same time, it judges whether tK is equal to 1. If tK=1, it will After tK is set to 0, calculate C=Rabin<KEY, r1, r2, R new > and D=XOR<r1, r2, R new > and send it to the reader; otherwise, use the random number automatic update method to update R new , Then calculate C and D and send them to the reader. Both C and D calculated here include R new , which ensures the freshness of the label feedback information and thus has the ability to resist tracking attacks.

消息②:C=Rabin<KEY,r1,r2,Rnew>,D=XOR<r1,r2,Rnew>Message ②: C=Rabin<KEY, r1, r2, R new >, D=XOR<r1, r2, R new >

读写器收到C和D后,通过D提取出Rnew=XOR<r1,r2,D>,再用KEYnew或KEYold计算出C'=Rabin<KEYnew或KEYold,r1,r2,Rnew>,与收到的C进行匹配,从而来认证标签的合法性。认证合法后更新KEYold=KEYnew和KEYnew=Rabin<KEYold>,并同时生成新的随机数Rnew',计算的E=Rabin<KEYold>&Rnew和F=XOR<Rnew,Rnew'>发送给标签。After the reader receives C and D, it extracts R new =XOR<r1,r2,D> through D, and then uses KEY new or KEY old to calculate C'=Rabin<KEY new or KEY old ,r1,r2, R new >, match the received C to verify the legitimacy of the tag. After authentication is valid, update KEY old = KEY new and KEY new = Rabin<KEY old >, and generate a new random number R new ' at the same time, calculate E=Rabin<KEY old >&R new and F=XOR<R new ,R new '> sent to the label.

消息③:E=Rabin<KEYold>&Rnew,F=XOR<Rnew,Rnew'>Message ③: E=Rabin<KEY old >&R new , F=XOR<R new ,R new '>

标签收到E后,通过与E'=Rabin<KEY>&Rnew匹配来认证阅读器合法性。若读写器合法,则在标签中更新KEY=Rabin<KEY>,Rnew,Rold,并将tK置1表示合法更新。若读写器不合法,则不更新。需要注意的是,读写器所产生的Rnew'不需要再读写器中保存。After the tag receives E, it authenticates the legitimacy of the reader by matching with E'=Rabin<KEY>&R new . If the reader/writer is legal, update KEY=Rabin<KEY>,R new ,R old in the tag, and set tK to 1 to indicate legal update. If the reader/writer is invalid, it will not be updated. It should be noted that the R new ' generated by the reader does not need to be saved in the reader.

至此使用随机数自动更新方法的双向认证过程结束。So far, the two-way authentication process using the random number automatic update method is over.

该实例是在MA等人提出的认证协议中加入标签随机数自动更新方法,使用Rabin算法作为本发明中的加密算法,实现了标签中随机数的自动更新,代替传统复杂的随机数产生器,确保了标签反馈数据的新鲜性,起到抵御跟踪攻击的作用,提高了RFID认证协议的安全性。同理,将加密算法改成轻量级的HASH算法或者MIXBITS算法等加密算法也可以实现同样的实施效果。This example is to add the label random number automatic update method in the authentication protocol proposed by MA et al., and use the Rabin algorithm as the encryption algorithm in the present invention to realize the automatic update of the random number in the label, instead of the traditional complex random number generator. It ensures the freshness of the tag feedback data, plays a role in resisting tracking attacks, and improves the security of the RFID authentication protocol. Similarly, changing the encryption algorithm to a lightweight HASH algorithm or MIXBITS algorithm can also achieve the same implementation effect.

以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变形或修改,这并不影响本发明的实质内容。Specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the specific embodiments described above, and those skilled in the art may make various changes or modifications within the scope of the claims, which do not affect the essence of the present invention.

Claims (6)

1. the RFID label tag random number automatic update method of a safety, it is characterised in that be contained in following steps:
(1) produce random number after read write line authenticating tag to preserve in the label;
(2) label preserves the random number that read write line transmits, and parameter tK is put the 1 legal renewal of expression;
(3) read write line sends request to label;
(4) when label receives read write line request, parameter tK is judged, if tK=1, enter step (6), if tK=0, enter Step (5);
(5) use AES that random number is encrypted computing, play regeneration function, tK is set to 0 simultaneously;
(6) random number is applied to this verification process, and carries out subsequent action.
A kind of safe RFID label tag random number automatic update method the most according to claim 1, it is characterised in that: read-write Device possesses random number and produces ability, and label possesses storage random number ability, and amendment parameter tK ability.
A kind of safe RFID label tag random number automatic update method the most according to claim 2, it is characterised in that: read-write After device label in read-write region sends request, the value of parameter tK can be differentiated by label, and is able to carry out encryption calculation Method computing.
A kind of safe RFID label tag random number automatic update method the most according to claim 3, it is characterised in that: label Required encrypted content can be selected when performing AES computing, the value of tK can be modified after having encrypted.
A kind of safe RFID label tag random number automatic update method the most according to claim 1, it is characterised in that: certification After completing, label has the ability to perform the renewal step of random number when receiving update content.
A kind of safe RFID label tag random number automatic update method the most according to claim 1, it is characterised in that: concrete Step is:
Label initial phase preserves two a length of L random number RnewAnd Rold, and preserve tK=1 and represent that random number is legal more Newly, tK=0 represents the most legal renewal of random number, wherein, RnewUse as label random number when certification next time, and close every time R after method certificationnewAnd RoldWill be updated, but without preserving in read write line;
When read write line sends request to label, first label can judge the most legal renewal of random number, i.e. judges that whether etc. tK In 1, if tK=1, then set to 0 and used RnewUse as normal random number;If tK=0, then the last certification of explanation occurs Abnormal, now can use in label for the function F of encryption original random number R preservednewAnd RoldIt is encrypted computing Rnew'=F < Rnew,Rold>, and the random number as this uses, and original RnewThen it is assigned to Rold
After legitimate authentication, read write line can produce the random number R of a length of L every timenew' be sent in label update Rnew, and by upper one Secondary RnewIt is assigned to Rold, tK is put 1 expression legal renewal random number simultaneously.
CN201610513299.XA 2016-06-30 2016-06-30 A kind of safe RFID label tag random number automatic update method Withdrawn CN106203579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610513299.XA CN106203579A (en) 2016-06-30 2016-06-30 A kind of safe RFID label tag random number automatic update method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610513299.XA CN106203579A (en) 2016-06-30 2016-06-30 A kind of safe RFID label tag random number automatic update method

Publications (1)

Publication Number Publication Date
CN106203579A true CN106203579A (en) 2016-12-07

Family

ID=57464173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610513299.XA Withdrawn CN106203579A (en) 2016-06-30 2016-06-30 A kind of safe RFID label tag random number automatic update method

Country Status (1)

Country Link
CN (1) CN106203579A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603228A (en) * 2016-12-21 2017-04-26 广东工业大学 RFID key wireless generation method based on Rabin encryption
CN106792686A (en) * 2016-12-13 2017-05-31 广东工业大学 A RFID two-way authentication method
CN110650019A (en) * 2019-09-20 2020-01-03 广州城市职业学院 RFID authentication method and system based on PUF and security sketch

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488179A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Authentication method and apparatus for wireless radio frequency recognition system
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN105530263A (en) * 2016-01-08 2016-04-27 广东工业大学 An ultra-lightweight RFID two-way authentication method based on tag ID

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488179A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Authentication method and apparatus for wireless radio frequency recognition system
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN105530263A (en) * 2016-01-08 2016-04-27 广东工业大学 An ultra-lightweight RFID two-way authentication method based on tag ID

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HAN ZHU: "An Improved Forward-Secure Anonymous RFID Authentication Protocol", 《2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING》 *
METE AKGUN: "Weaknesses of Two RFID Protocols Regarding De-synchronization Attacks", 《2015 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)》 *
沈金伟: "一种改进的超轻量级RFID认证协议", 《计算机应用与软甲》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792686A (en) * 2016-12-13 2017-05-31 广东工业大学 A RFID two-way authentication method
CN106792686B (en) * 2016-12-13 2020-01-07 广东工业大学 A kind of RFID two-way authentication method
CN106603228A (en) * 2016-12-21 2017-04-26 广东工业大学 RFID key wireless generation method based on Rabin encryption
CN110650019A (en) * 2019-09-20 2020-01-03 广州城市职业学院 RFID authentication method and system based on PUF and security sketch
CN110650019B (en) * 2019-09-20 2022-06-14 广州城市职业学院 RFID authentication method and system based on PUF and security sketch

Similar Documents

Publication Publication Date Title
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN113691502B (en) Communication method, device, gateway server, client and storage medium
Sun et al. Improvements of Juang's password-authenticated key agreement scheme using smart cards
CN103020671B (en) A kind of radio frequency identification mutual authentication method based on hash function
CN101847199B (en) Security authentication method for radio frequency recognition system
CN101488854B (en) Wireless RFID system authentication method and apparatus
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
US8332628B2 (en) Method for accessing data safely suitable for electronic tag
CN110147666B (en) Lightweight NFC identity authentication method and IoT communication platform in IoT scenarios
CN103795543A (en) A secure two-way authentication method for RFID systems
CN107171811B (en) A Lightweight RFID Security Authentication Method Based on Present Algorithm
CN111970114B (en) File encryption method, system, server and storage medium
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN103532718A (en) Authentication method and authentication system
CN107612949A (en) A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
CN112182551B (en) PLC equipment identity authentication system and PLC equipment identity authentication method
CN111884814B (en) Method and system for preventing intelligent terminal from being counterfeited
KR102539418B1 (en) Apparatus and method for mutual authentication based on physical unclonable function
CN110336663A (en) A PUFs group-to-group authentication scheme based on blockchain technology
CN100476844C (en) Method for realizing binding function between electronic key and computer
CN110225028B (en) A distributed anti-counterfeiting system and method thereof
CN103699863B (en) A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207