CN106203579A - A kind of safe RFID label tag random number automatic update method - Google Patents
A kind of safe RFID label tag random number automatic update method Download PDFInfo
- Publication number
- CN106203579A CN106203579A CN201610513299.XA CN201610513299A CN106203579A CN 106203579 A CN106203579 A CN 106203579A CN 201610513299 A CN201610513299 A CN 201610513299A CN 106203579 A CN106203579 A CN 106203579A
- Authority
- CN
- China
- Prior art keywords
- random number
- label
- new
- tag
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004364 calculation method Methods 0.000 claims abstract description 6
- 230000002159 abnormal effect Effects 0.000 claims 1
- 230000008929 regeneration Effects 0.000 claims 1
- 238000011069 regeneration method Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 claims 1
- 238000004422 calculation algorithm Methods 0.000 abstract description 21
- 230000005540 biological transmission Effects 0.000 abstract description 7
- 238000013461 design Methods 0.000 abstract description 5
- 238000011160 research Methods 0.000 abstract description 3
- 238000004519 manufacturing process Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 241001262968 Eunice Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07318—Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
RFID认证方法要具备抵抗跟踪攻击的能力,不能仅仅靠简单的密钥更新来实现,还需在标签中生成随机数,并将随机数加入到认证过程传输信息的计算中。但随机数的产生器会导致标签的设计复杂度与成本增加,因此,设计一个随机数自动更新方法具有重要的研究意义和使用价值。本发明提出一种安全的RFID标签随机数自动更新方法取代传统的随机数产生器,并将随机数加入到认证过程传输信息的计算中,保证RFID标签在每一次认证时的反馈信息都是不一样的,从而起到标签防跟踪的作用。该随机数自动更新方法基于标签中原本带有的加密算法,如HASH、MIXBITS、Rabin等等。该方法解决了目前RFID系统中标签制作成本高的问题,同时提高了RFID认证的安全性和认证效率。
The RFID authentication method must have the ability to resist tracking attacks. It cannot be realized only by simple key update, but also needs to generate random numbers in the tag, and add the random numbers to the calculation of the information transmitted during the authentication process. However, the random number generator will increase the design complexity and cost of the label. Therefore, designing a random number automatic update method has important research significance and use value. The present invention proposes a safe method for automatically updating random numbers of RFID tags to replace traditional random number generators, and adds random numbers to the calculation of transmission information in the authentication process to ensure that the feedback information of RFID tags in each authentication is accurate. The same, so as to play the role of tag anti-tracking. The random number automatic update method is based on the original encryption algorithm in the tag, such as HASH, MIXBITS, Rabin and so on. The method solves the problem of high label production cost in the current RFID system, and simultaneously improves the security and authentication efficiency of RFID authentication.
Description
技术领域technical field
本发明涉及射频识别研究领域,具体涉及一种安全的RFID系统中标签随机数的自动更新方法,其中随机数用于RFID认证过程中传输信息的计算。The invention relates to the field of radio frequency identification research, in particular to a method for automatically updating tag random numbers in a safe RFID system, wherein the random numbers are used for the calculation of transmission information in the RFID authentication process.
背景技术Background technique
无线射频识别技术(radio frequency identification,RFID)是一种利用射频信号实现无接触信息传输,并通过所传输的信息来实现认证与识别目的的技术。随着RFID的普及,对RFID标签的规格、成本与性能要求越来越高,尺寸小、成本低、性能高且安全性高称为衡量RFID系统质量的标准。Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to achieve contactless information transmission, and uses the transmitted information to achieve authentication and identification purposes. With the popularization of RFID, the specifications, cost and performance requirements of RFID tags are getting higher and higher. Small size, low cost, high performance and high security are called standards for measuring the quality of RFID systems.
RFID系统通常包括后端服务器系统、RFID读写器、RFID标签三部分。由于标签的处理能力受限,且人们很难感知射频信号的非法读取,导致RFID读写器与RFID标签之间的通信存在安全与隐私隐患,容易受到各种安全攻击的威胁。为了抵抗跟踪攻击,Godor G等人提出了标签信息更新的认证方案,但方案不能抵制去同步化攻击,攻击者可以通过重放消息,使读写器与标签两者之间的密钥不一致,从而破坏两者之间的后续认证(Godor G,ImreS.Hash-based mutual authentication protocol for low-cost RFID systems[C]//Proc of the 18th EUNICE Conf on Information and CommunicationsTechnologies.Berlin:Springer,2012:76-87.);Zhou等人基于物理不可克隆函数(Physically Unclonable Function,PUF)提出一种安全认证协议,在标签中加入了随机数产生器来保证标签反馈信息的新鲜性,从而具备抵抗跟踪攻击能力,但随机数产生器的加入使得标签的成本大大增加(Zhou Enhui,Liu Yana.Physically unclonable functionbased high performance privacy protection algorithm of RFID network[J].Application of Electronic Technique,2016,42(3):98-101.);Shen等人基于非线性函数MIXBITS提出一种安全RFID认证协议,同样是在标签中加入随机数产生器来保证标签反馈信息的不唯一性,起到抵抗跟踪作用,但同样的问题就是在标签中加入了随机数产生器使得标签的成本带来不少压力(Shen Jinwei,Ling Jie.An improved ultra-lightweightRFID authentication protocol[J].Computer Applications and Software,2015,32(2):304-306.);MA等人基于Rabin加密算法提出一种RFID双向认证的方法,通过更新秘钥信息来保证标签反馈信息的新鲜性,但依然易受跟踪攻击和去同步化攻击(MA Yuanjia,LIU Daowei.Improved mutual authentication with backward security for RFIDprotocols[J].Computer Engineering and Applications,2016,3,2:1-5.)。基于上面的叙述可知,RFID认证方法要具备抵抗跟踪攻击的能力,不能仅仅靠简单的密钥更新来实现,还需在标签中生成随机数,并将随机数加入到认证过程传输信息的计算中。但随机数的产生器会导致标签的设计复杂度与成本增加,因此,设计一个随机数自动更新方法具有重要的研究意义和使用价值。An RFID system usually includes three parts: a back-end server system, an RFID reader, and an RFID tag. Due to the limited processing power of the tag and the fact that it is difficult for people to perceive the illegal reading of the radio frequency signal, the communication between the RFID reader and the RFID tag has security and privacy risks, and is vulnerable to various security attacks. In order to resist tracking attacks, Godor G et al. proposed an authentication scheme for updating tag information, but the scheme cannot resist desynchronization attacks. The attacker can make the key between the reader and the tag inconsistent by replaying the message. Thereby destroying the subsequent authentication between the two (Godor G, Imre S. Hash-based mutual authentication protocol for low-cost RFID systems [C]//Proc of the 18th EUNICE Conf on Information and Communications Technologies. Berlin: Springer, 2012: 76 -87.); Zhou et al. proposed a security authentication protocol based on Physically Unclonable Function (PUF), and added a random number generator to the tag to ensure the freshness of the tag feedback information, thus resisting tracking attacks capabilities, but the addition of random number generators greatly increases the cost of tags (Zhou Enhui, Liu Yana.Physically unclonable function based high performance privacy protection algorithm of RFID network[J].Application of Electronic Technique,2016,42(3):98 -101.); Shen et al. proposed a secure RFID authentication protocol based on the nonlinear function MIXBITS, which also added a random number generator to the label to ensure the non-uniqueness of the label feedback information and play a role in resisting tracking, but the same The problem is that adding a random number generator to the tag brings a lot of pressure on the cost of the tag (Shen Jinwei, Ling Jie. An improved ultra-lightweight RFID authentication protocol [J]. Computer Applications and Software, 2015, 32 (2): 304-306.); MA et al. proposed a RFID two-way authentication method based on the Rabin encryption algorithm, which ensures the freshness of the tag feedback information by updating the secret key information, but is still vulnerable to tracking attacks and desynchronization attacks (MA Yuanjia ,LIU Daowei.Improved mutual authentication with backward security for RFIDprotocols[J].Com Puter Engineering and Applications, 2016, 3, 2: 1-5.). Based on the above description, it can be seen that the RFID authentication method must have the ability to resist tracking attacks, and it cannot be realized only by simple key update, but also needs to generate random numbers in the label, and add the random numbers to the calculation of the information transmitted during the authentication process. . However, the random number generator will increase the design complexity and cost of the label. Therefore, designing a random number automatic update method has important research significance and use value.
发明内容Contents of the invention
本发明的目的在于克服现有技术的缺点和不足,提出一种安全的RFID标签随机数自动更新方法取代传统的随机数产生器,并将随机数加入到认证过程传输信息的计算中,保证RFID标签在每一次认证时的反馈信息都是不一样的,从而起到标签防跟踪的作用。该随机数自动更新方法基于标签中原本带有的加密算法,如HASH、MIXBITS、Rabin等等。该方法解决了目前RFID系统中标签制作成本高的问题,同时提高了RFID认证的安全性和认证效率。The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, propose a safe RFID tag random number automatic update method to replace the traditional random number generator, and add the random number to the calculation of the transmission information in the authentication process to ensure RFID The feedback information of the label in each authentication is different, so as to play the role of anti-tracking of the label. The random number automatic update method is based on the original encryption algorithm in the tag, such as HASH, MIXBITS, Rabin and so on. The method solves the problem of high label production cost in the current RFID system, and simultaneously improves the security and authentication efficiency of RFID authentication.
一种安全的RFID标签随机数自动更新方法,包含于以下步骤:A safe RFID tag random number automatic update method is included in the following steps:
(1)读写器认证标签后产生随机数保存在标签中;(1) After the reader authenticates the tag, a random number is generated and stored in the tag;
(2)标签保存读写器传来的随机数,并将参数tK置1表示合法更新;(2) The tag saves the random number sent by the reader, and sets the parameter tK to 1 to indicate a legal update;
(3)读写器向标签发送请求;(3) The reader sends a request to the tag;
(4)标签收到读写器请求时,对参数tK进行判断,若tK=1,进入步骤(6),若tK=0,进入步骤(5);(4) When the tag receives the reader-writer request, it judges the parameter tK, if tK=1, enters step (6), if tK=0, enters step (5);
(5)使用加密算法对随机数进行加密运算,起到更新作用,同时将tK置0;(5) Use an encryption algorithm to encrypt the random number to play an update role, and set tK to 0 at the same time;
(6)将随机数应用于该次认证过程,并进行后续动作。(6) Apply the random number to the authentication process, and perform follow-up actions.
读写器具备随机数产生能力,标签具备存储随机数能力,以及修改参数tK能力。The reader has the ability to generate random numbers, and the tag has the ability to store random numbers and modify the parameter tK.
读写器向读写区域内的标签发送请求之后,标签会对参数tK的值进行判别,并能够执行加密算法运算。After the reader-writer sends a request to the tag in the read-write area, the tag will judge the value of the parameter tK and be able to perform encryption algorithm operations.
标签在执行加密算法运算时可以选择所需的加密内容,加密完成后会对tK的值进行修改。The tag can choose the required encrypted content when performing the encryption algorithm operation, and the value of tK will be modified after the encryption is completed.
认证完成后标签在收到更新内容时有能力执行随机数的更新步骤。After the authentication is completed, the tag has the ability to perform the update step of the random number when receiving the updated content.
本发明的RFID标签随机数自动更新方法具有如下优点和有益效果:The method for automatically updating the random number of the RFID tag of the present invention has the following advantages and beneficial effects:
(1)本发明抛弃了传统的随机数产生器,采用标签中自带的加密算法对随机数进行更新,与加密算法使用了同一组门电路,大大节约了标签的设计成本,同时也简化了标签的设计的复杂度;(1) The present invention abandons the traditional random number generator, uses the encryption algorithm in the label to update the random number, and uses the same set of gate circuits as the encryption algorithm, which greatly saves the design cost of the label and simplifies the complexity of the design of the label;
(2)本发明中使用到的加密算法是经过安全证明的,具有极高的安全性,而且加密算法并不会出现重复结果,完全满足新鲜性的需求;(2) The encryption algorithm used in the present invention is through security proof, has extremely high security, and encryption algorithm can not appear duplicate result, fully meets the requirement of freshness;
(3)在本发明中,每次合法认证后都会对标签中的随机数进行合法更新,类似随机数格式化,减少前后随机数的代数关联;(3) In the present invention, after each legal authentication, the random number in the label will be legally updated, similar to the format of the random number, reducing the algebraic association of the random number before and after;
(4)本发明保证了标签反馈信息的新鲜性,进而提高了RFID认证协议的安全性,使认证完全能够抵抗跟踪攻击。(4) The present invention ensures the freshness of the tag feedback information, further improves the security of the RFID authentication protocol, and makes the authentication fully resistant to tracking attacks.
附图说明Description of drawings
图1随机数自动更新原理图;Fig. 1 Schematic diagram of random number automatic update;
图2实例中随机数自动更新图;The random number automatic update diagram in the example in Figure 2;
图3更新方法的应用实例图。Figure 3 is an application example diagram of the update method.
具体实施方式detailed description
下面结合应用实例附图对本发明作进一步的详细描述,该实例中所使用的是Rabin加密算法,Shamir A.已经对该加密算法进行过安全性证明(Shamir A.SQUASH-A newMAC with provable security properties for highly constrained devices such asRFID tags[C]//Proc of Fast Software Encryption.Berlin:Springer,2008:144-157)。但本发明的实施方法不仅限于此。Below in conjunction with application example accompanying drawing, the present invention is described in further detail, what used in this example is Rabin encryption algorithm, Shamir A. has carried out security proof (Shamir A.SQUASH-A newMAC with provable security properties) to this encryption algorithm for highly constrained devices such asRFID tags[C]//Proc of Fast Software Encryption. Berlin: Springer, 2008: 144-157). However, the implementation method of the present invention is not limited thereto.
本发明通过以下步骤实现,如图1:The present invention is realized through the following steps, as shown in Figure 1:
(1)标签初始化阶段保存两个长度为L随机数Rnew和Rold,并保存tK=1表示随机数合法更新(tK=0表示随机数未合法更新)。其中Rnew在下次认证时当做标签随机数使用,而每次合法认证后Rnew和Rold都会进行更新,但无需在读写器中保存;(1) In the tag initialization stage, two random numbers R new and R old with a length of L are saved, and tK=1 means that the random number is legally updated (tK=0 means that the random number is not legally updated). Among them, R new will be used as a label random number in the next authentication, and R new and R old will be updated after each legal authentication, but there is no need to save it in the reader;
(2)当读写器向标签发送请求时,标签首先会判断随机数是否合法更新,即判断tK是否等于1。若tK=1,则将其置0并使用Rnew作为正常随机数使用;若tK=0,则说明上一次认证出现异常,此时会使用标签中用于加密的函数F对原先保存的随机数Rnew和Rold进行加密运算Rnew'=F<Rnew,Rold>,并作为本次的随机数使用,而原来的Rnew则赋值给Rold;(2) When the reader/writer sends a request to the tag, the tag will first judge whether the random number is legally updated, that is, judge whether tK is equal to 1. If tK=1, set it to 0 and use R new as a normal random number; if tK=0, it means that there was an exception in the last authentication. The numbers R new and R old are encrypted, R new '=F<R new , R old >, and used as the random number this time, while the original R new is assigned to R old ;
(3)每次合法认证后读写器会产生长度为L的随机数Rnew'发送到标签中更新Rnew,并将上一次的Rnew赋值给Rold,同时将tK置1表示合法更新随机数。(3) After each legal authentication, the reader will generate a random number R new ' of length L and send it to the tag to update R new , and assign the last R new to R old , and set tK to 1 to indicate a legal update random number.
所述的步骤(2)中的加密函数F,最优的方案是选择单向的加密函数,即无法通过密文推出明文。事实上传统的双向加密算法设计复杂、功耗大,并不适合在轻量级RFID标签中使用。加密函数F的输出必须是规定的L位。目前满足该要求的高安全性的算法有HASH函数、MIXBITS函数和Rabin函数等等。For the encryption function F in the step (2), the optimal solution is to choose a one-way encryption function, that is, the plaintext cannot be deduced through the ciphertext. In fact, the traditional two-way encryption algorithm is complex in design and consumes a lot of power, which is not suitable for use in lightweight RFID tags. The output of the encryption function F must be the specified L bits. At present, the high-security algorithms that meet this requirement include HASH function, MIXBITS function, Rabin function and so on.
参见附图2、3,首先给出本实例所述方法中涉及到的各个符号的含义:Referring to accompanying drawing 2,3, at first provide the implication of each symbol involved in the method described in this example:
R:读写器;R: reader;
T:标签;T: label;
KEY:标签与读写器之间的共享密钥,长度为L;KEY: The shared key between the tag and the reader, the length is L;
KEYold:上一次认证使用的共享密钥;KEY old : the shared key used in the last authentication;
KEYnew:本次认证使用的共享密钥;KEY new : the shared key used in this authentication;
ID:标签的唯一标识符,与密文形式存储,长度为2L;ID: the unique identifier of the tag, stored in ciphertext, with a length of 2L;
ID_L:ID的左半部分;ID_L: the left half of the ID;
ID_R:ID的右半部分;ID_R: the right half of the ID;
r1,r2:读写器在发送请求时生成的随机数;r1, r2: the random number generated by the reader when sending the request;
Rnew:读写器每次在确定标签合法后产生的随机数,保存在标签中;R new : The reader generates a random number each time the tag is legal, and saves it in the tag;
Rold:标签中生一次使用的随机数,用于更新随机数Rnew;R old : The random number used once in the label is used to update the random number R new ;
Rabin<X>:单向加密算法,Rabin<X>=[X2mod M]L,其中X为加密内容,M为模数,[]L为取运算结果的前L位;Rabin<X>: one-way encryption algorithm, Rabin<X>=[X 2 mod M] L , where X is the encrypted content, M is the modulus, and [] L is the first L bits of the operation result;
M:模数,M=2L-1;M: modulus, M=2 L -1;
XOR:异或运算;XOR: Exclusive OR operation;
&:与运算。&: AND operation.
在给出详细解释之前,先给出假设:由于RFID系统读写器与后端服务器系统之间的传输方式通常为有线传输,因而默认两者之间的传输是安全的,并把两者看做一个整体。如图2所示,下面对实例进行详细说明:Before giving a detailed explanation, a hypothesis is given: Since the transmission mode between the RFID system reader and the back-end server system is usually wired transmission, the transmission between the two is safe by default, and the two are viewed as make a whole. As shown in Figure 2, the following is a detailed description of the example:
消息①:Query,A=XOR<ID_L,r1>,B=XOR<ID_R,r2>Message ①: Query, A=XOR<ID_L, r1>, B=XOR<ID_R, r2>
读写器产生随机数r1和r2,计算出A=XOR<ID_L,r1>和B=XOR<ID_R,r2>,与认证请求一并发送给标签。标签收到A和B后,结合自身保存的标签编码ID_L和ID_R提取r1=XOR<ID_L,A>和r2=XOR<ID_R,B>;同时判断tK是否等于1,若tK=1,则将tK置0后并计算C=Rabin<KEY,r1,r2,Rnew>和D=XOR<r1,r2,Rnew>发送到读写器;否则使用随机数自动更新方法对Rnew进行更新,再计算C和D发送给阅读器。在这里计算出的C和D都包含有Rnew,保证了标签反馈信息的新鲜性,进而具备抗跟踪攻击能力。The reader generates random numbers r1 and r2, calculates A=XOR<ID_L, r1> and B=XOR<ID_R, r2>, and sends them to the tag together with the authentication request. After receiving A and B, the tag extracts r1=XOR<ID_L,A> and r2=XOR<ID_R,B> in combination with the tag codes ID_L and ID_R saved by itself; at the same time, it judges whether tK is equal to 1. If tK=1, it will After tK is set to 0, calculate C=Rabin<KEY, r1, r2, R new > and D=XOR<r1, r2, R new > and send it to the reader; otherwise, use the random number automatic update method to update R new , Then calculate C and D and send them to the reader. Both C and D calculated here include R new , which ensures the freshness of the label feedback information and thus has the ability to resist tracking attacks.
消息②:C=Rabin<KEY,r1,r2,Rnew>,D=XOR<r1,r2,Rnew>Message ②: C=Rabin<KEY, r1, r2, R new >, D=XOR<r1, r2, R new >
读写器收到C和D后,通过D提取出Rnew=XOR<r1,r2,D>,再用KEYnew或KEYold计算出C'=Rabin<KEYnew或KEYold,r1,r2,Rnew>,与收到的C进行匹配,从而来认证标签的合法性。认证合法后更新KEYold=KEYnew和KEYnew=Rabin<KEYold>,并同时生成新的随机数Rnew',计算的E=Rabin<KEYold>&Rnew和F=XOR<Rnew,Rnew'>发送给标签。After the reader receives C and D, it extracts R new =XOR<r1,r2,D> through D, and then uses KEY new or KEY old to calculate C'=Rabin<KEY new or KEY old ,r1,r2, R new >, match the received C to verify the legitimacy of the tag. After authentication is valid, update KEY old = KEY new and KEY new = Rabin<KEY old >, and generate a new random number R new ' at the same time, calculate E=Rabin<KEY old >&R new and F=XOR<R new ,R new '> sent to the label.
消息③:E=Rabin<KEYold>&Rnew,F=XOR<Rnew,Rnew'>Message ③: E=Rabin<KEY old >&R new , F=XOR<R new ,R new '>
标签收到E后,通过与E'=Rabin<KEY>&Rnew匹配来认证阅读器合法性。若读写器合法,则在标签中更新KEY=Rabin<KEY>,Rnew,Rold,并将tK置1表示合法更新。若读写器不合法,则不更新。需要注意的是,读写器所产生的Rnew'不需要再读写器中保存。After the tag receives E, it authenticates the legitimacy of the reader by matching with E'=Rabin<KEY>&R new . If the reader/writer is legal, update KEY=Rabin<KEY>,R new ,R old in the tag, and set tK to 1 to indicate legal update. If the reader/writer is invalid, it will not be updated. It should be noted that the R new ' generated by the reader does not need to be saved in the reader.
至此使用随机数自动更新方法的双向认证过程结束。So far, the two-way authentication process using the random number automatic update method is over.
该实例是在MA等人提出的认证协议中加入标签随机数自动更新方法,使用Rabin算法作为本发明中的加密算法,实现了标签中随机数的自动更新,代替传统复杂的随机数产生器,确保了标签反馈数据的新鲜性,起到抵御跟踪攻击的作用,提高了RFID认证协议的安全性。同理,将加密算法改成轻量级的HASH算法或者MIXBITS算法等加密算法也可以实现同样的实施效果。This example is to add the label random number automatic update method in the authentication protocol proposed by MA et al., and use the Rabin algorithm as the encryption algorithm in the present invention to realize the automatic update of the random number in the label, instead of the traditional complex random number generator. It ensures the freshness of the tag feedback data, plays a role in resisting tracking attacks, and improves the security of the RFID authentication protocol. Similarly, changing the encryption algorithm to a lightweight HASH algorithm or MIXBITS algorithm can also achieve the same implementation effect.
以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变形或修改,这并不影响本发明的实质内容。Specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the specific embodiments described above, and those skilled in the art may make various changes or modifications within the scope of the claims, which do not affect the essence of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513299.XA CN106203579A (en) | 2016-06-30 | 2016-06-30 | A kind of safe RFID label tag random number automatic update method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513299.XA CN106203579A (en) | 2016-06-30 | 2016-06-30 | A kind of safe RFID label tag random number automatic update method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106203579A true CN106203579A (en) | 2016-12-07 |
Family
ID=57464173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610513299.XA Withdrawn CN106203579A (en) | 2016-06-30 | 2016-06-30 | A kind of safe RFID label tag random number automatic update method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203579A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603228A (en) * | 2016-12-21 | 2017-04-26 | 广东工业大学 | RFID key wireless generation method based on Rabin encryption |
CN106792686A (en) * | 2016-12-13 | 2017-05-31 | 广东工业大学 | A RFID two-way authentication method |
CN110650019A (en) * | 2019-09-20 | 2020-01-03 | 广州城市职业学院 | RFID authentication method and system based on PUF and security sketch |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488179A (en) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | Authentication method and apparatus for wireless radio frequency recognition system |
CN103905202A (en) * | 2014-03-28 | 2014-07-02 | 广东工业大学 | RFID lightweight class bidirectional authentication method based on PUF |
CN105530263A (en) * | 2016-01-08 | 2016-04-27 | 广东工业大学 | An ultra-lightweight RFID two-way authentication method based on tag ID |
-
2016
- 2016-06-30 CN CN201610513299.XA patent/CN106203579A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488179A (en) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | Authentication method and apparatus for wireless radio frequency recognition system |
CN103905202A (en) * | 2014-03-28 | 2014-07-02 | 广东工业大学 | RFID lightweight class bidirectional authentication method based on PUF |
CN105530263A (en) * | 2016-01-08 | 2016-04-27 | 广东工业大学 | An ultra-lightweight RFID two-way authentication method based on tag ID |
Non-Patent Citations (3)
Title |
---|
HAN ZHU: "An Improved Forward-Secure Anonymous RFID Authentication Protocol", 《2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING》 * |
METE AKGUN: "Weaknesses of Two RFID Protocols Regarding De-synchronization Attacks", 《2015 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)》 * |
沈金伟: "一种改进的超轻量级RFID认证协议", 《计算机应用与软甲》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106792686A (en) * | 2016-12-13 | 2017-05-31 | 广东工业大学 | A RFID two-way authentication method |
CN106792686B (en) * | 2016-12-13 | 2020-01-07 | 广东工业大学 | A kind of RFID two-way authentication method |
CN106603228A (en) * | 2016-12-21 | 2017-04-26 | 广东工业大学 | RFID key wireless generation method based on Rabin encryption |
CN110650019A (en) * | 2019-09-20 | 2020-01-03 | 广州城市职业学院 | RFID authentication method and system based on PUF and security sketch |
CN110650019B (en) * | 2019-09-20 | 2022-06-14 | 广州城市职业学院 | RFID authentication method and system based on PUF and security sketch |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102138300B (en) | Message authentication code pre-computation with applications to secure memory | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
Sun et al. | Improvements of Juang's password-authenticated key agreement scheme using smart cards | |
CN103020671B (en) | A kind of radio frequency identification mutual authentication method based on hash function | |
CN101847199B (en) | Security authentication method for radio frequency recognition system | |
CN101488854B (en) | Wireless RFID system authentication method and apparatus | |
CN104115442B (en) | RFID bidirectional authentication method based on asymmetric secret key and Hash function | |
US8332628B2 (en) | Method for accessing data safely suitable for electronic tag | |
CN110147666B (en) | Lightweight NFC identity authentication method and IoT communication platform in IoT scenarios | |
CN103795543A (en) | A secure two-way authentication method for RFID systems | |
CN107171811B (en) | A Lightweight RFID Security Authentication Method Based on Present Algorithm | |
CN111970114B (en) | File encryption method, system, server and storage medium | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN104125239B (en) | A kind of method for network authorization transmitted based on data link encryption and system | |
CN102594842A (en) | Device-fingerprint-based network management message authentication and encryption scheme | |
CN103532718A (en) | Authentication method and authentication system | |
CN107612949A (en) | A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint | |
CN104484628B (en) | It is a kind of that there is the multi-application smart card of encrypting and decrypting | |
CN112182551B (en) | PLC equipment identity authentication system and PLC equipment identity authentication method | |
CN111884814B (en) | Method and system for preventing intelligent terminal from being counterfeited | |
KR102539418B1 (en) | Apparatus and method for mutual authentication based on physical unclonable function | |
CN110336663A (en) | A PUFs group-to-group authentication scheme based on blockchain technology | |
CN100476844C (en) | Method for realizing binding function between electronic key and computer | |
CN110225028B (en) | A distributed anti-counterfeiting system and method thereof | |
CN103699863B (en) | A kind of asynchronous attack resistant ultra-lightweight radio frequency identification authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161207 |