CN106487495B - Lightweight RFID authentication method based on integer chaos - Google Patents

Lightweight RFID authentication method based on integer chaos Download PDF

Info

Publication number
CN106487495B
CN106487495B CN201610972401.2A CN201610972401A CN106487495B CN 106487495 B CN106487495 B CN 106487495B CN 201610972401 A CN201610972401 A CN 201610972401A CN 106487495 B CN106487495 B CN 106487495B
Authority
CN
China
Prior art keywords
tid
initialvalue
timearray
pseudo
rid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610972401.2A
Other languages
Chinese (zh)
Other versions
CN106487495A (en
Inventor
刘建东
王淑鸿
张啸
赵晨
商凯
胡辉辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute Of Petroleum And Chemical Technology
Original Assignee
Beijing Institute Of Petroleum And Chemical Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute Of Petroleum And Chemical Technology filed Critical Beijing Institute Of Petroleum And Chemical Technology
Priority to CN201610972401.2A priority Critical patent/CN106487495B/en
Publication of CN106487495A publication Critical patent/CN106487495A/en
Application granted granted Critical
Publication of CN106487495B publication Critical patent/CN106487495B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/77Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a lightweight RFID authentication method based on integer chaos, which utilizes pseudo-random numbers to ensure the freshness of communication contents between a tag and a reader and utilizes a Hash function to ensure the confidentiality of the communication contents, thereby being capable of resisting common attack means such as impersonation attack, replay attack, eavesdropping and the like.

Description

Lightweight RFID authentication method based on integer chaos
Technical Field
The invention relates to the technical field of RFID authentication, in particular to a lightweight RFID authentication method based on integer chaos.
Background
Radio Frequency Identification (RFID) technology is a contactless automatic identification technology, which is essentially wireless communication between a reader and an electronic tag attached to an identified object. The RFID technology can be widely applied to various fields such as traffic, retail and logistics, and is one of important support technologies of the Internet of things. However, the application of RFID technology is greatly restricted by the security problem of the RFID system, and the main security problem is the authentication problem between the electronic tag and the reader. Therefore, it is necessary to develop an authentication protocol suitable for the RFID system.
The Hash-Lock protocol uses meta ID to replace the real ID of the tag to transmit in a wireless channel, so as to avoid the leakage of the real ID of the tag. Where the metaID is obtained by hashing the key. In the Hash-Lock protocol, for a specific tag, the communication content of the tag is the same as that of a reader every time of authentication, and a random number is not used for guaranteeing the message freshness, so that the tag is easily locked and tracked by an attacker. In addition, in the last step of authentication process of the protocol, the real unique ID of the label is directly transmitted through an unsafe channel and is easy to monitor. Therefore, the Hask-Lock protocol is not perfect.
The zhangxing et al proposes an RFID authentication protocol based on a lightweight cryptographic algorithm PRESENT in a document "RFID security authentication protocol based on a PRESENT algorithm", which utilizes PRESENT to encrypt a tag ID and also sets an ID refresh mechanism. However, the PRESENT algorithm is designed on the basis of S-boxes, which imposes a certain burden on the storage of tags. In addition, a timing mechanism is designed in the protocol, and if the response time is longer than the set time, the authentication is stopped, which cannot well resist denial of service attack, and once the information is intercepted or the transmission is delayed, the authentication is terminated.
Disclosure of Invention
The invention aims to provide a lightweight RFID authentication method based on integer chaos, which utilizes pseudo-random numbers to ensure the freshness of communication contents between a tag and a reader and utilizes a Hash function to ensure the confidentiality of the communication contents, thereby being capable of resisting common attack means such as impersonation attack, replay attack, eavesdropping and the like.
The purpose of the invention is realized by the following technical scheme:
a lightweight RFID authentication method based on integer chaos comprises the following steps:
the reader generates two pseudo-random numbers R1And R2And sends an authentication request Query and a pseudo random number R1Sending to the label; wherein the pseudo-random number R2From pseudo-random numbers R1Iteration generation;
after the tag receives the authentication request Query, the pseudo random number is used asR1Computing a pseudorandom number R for a key2Then Hash operation is carried out on the ID TID of the self-body to obtain H (TID), and H (TID) and pseudo-random number R are used2XOR operation result H (TID) & gtR2Sending the data to a reader;
h (TID) ≧ R sent by the reader receiving the label2Then, it is mixed with a pseudo random number R2Performing XOR operation to obtain H (TID), and then sending H (TID) to a database;
the database inquires whether certain data H (TID ') exists locally or not, so that the H (TID ') is H (TID), and if the H (TID ') does not exist, the authentication fails; if yes, H (TID ^ RID') is calculated and sent to the reader; the RID' is a locally stored reading identifier with tag reading authority;
after receiving H (TID ^ RID ') sent by the database, the reader combines the H (TID ^ RID') with the pseudo-random number R2Performing XOR operation, and converting the operation result H (TID ^ RID ^ R)2And sending to the label; the label receives H (TID ^ RID ^ R2Then, it is first combined with a pseudo random number R2Performing exclusive-or operation to obtain H (TID '. gtoreq.RID'), calculating H (TID. gtoreq.RID) by using the TID and the RID stored in the exclusive-or operation, verifying whether H exists (TID '. gtoreq.RID') (H (TID. gtoreq.RID)), and if the equation is satisfied, passing the authentication; otherwise, authentication fails.
And the pseudo-random number R1 is generated by taking the XOR result of the system time and the user password as an iteration initial value and then being introduced into a coupled dynamic integer tent mapping lattice model for iteration.
Setting the system size L of the coupled dynamic integer tent mapping lattice model to be 16;
the current time of the system is taken, the accuracy is up to the second, and the system and the user password are operated according to the following rules:
initialvalue(0)=timearray(0)+pw(0);
initialvalue(1)=timearray(1)+pw(1);
initialvalue(2)=timearray(2)+pw(2);
initialvalue(3)=timearray(3)+pw(3);
initialvalue(4)=timearray(4)+pw(4);
initialvalue(5)=timearray(5)+pw(5);
initialvalue(6)=timearray(6)+pw(4);
initialvalue(7)=timearray(7)+pw(3);
initialvalue(8)=timearray(8)+pw(2);
initialvalue(9)=timearray(9)+pw(1);
initialvalue(10)=timearray(10)+pw(0);
initialvalue(11)=timearray(11)+pw(1);
initialvalue(12)=timearray(12)+pw(2);
initialvalue(13)=timearray(13)+pw(3);
initialvalue(14)=timearray(14)+pw(4);
initialvalue(15)=timearray(15)+pw(5);
wherein initialvalue is an iteration initial value vector, timerray is a byte array form of the current time of the system, and pw is a byte array form of the user password;
substituting the initial value vector initialvalue into a coupled dynamic integer tent image lattice model to iterate for L +10 steps to obtain a pseudo-random number R1
The pseudo random number R2With pseudo-random numbers R1And substituting the initial value into the coupled dynamic integer tent mapping lattice model for iteration in the step L +10 to obtain the initial value.
The technical scheme provided by the invention can show that 1) the communication content of the tag and the reader is transmitted after Hash operation and exclusive-or operation, even if intercepted, the transmitted content is only a series of random numbers seen by an attacker, and due to the unidirectional property of the Hash function, the attacker cannot obtain a legal tag identification TID from H (TID) and cannot obtain any useful information, so that the interception can be effectively prevented. 2) Because of the participation of the pseudo-random number in each authentication, the contents of each communication in the authentication process of the same label are completely different, so that an attacker cannot lock any label from the contents of the communication, and the position tracking is avoided. 3) Since each authentication process generates a different pseudo random numberAn attacker intercepts and captures H (TID) ^ R sent by the label in one authentication process2After the next time the reader sends out the authentication request, H (TID) < R >2The replay can not pass the authentication, so that the replay attack can be effectively prevented. 4) For counterfeit tags, because the TID is confidential data, after the reader initiates an authentication request, the counterfeit tags have difficulty in simulating legal response data h (TID ≧ R)2And further cannot pass the authentication of the database; for a fake reader, the fake reader cannot obtain the user's password first, and then cannot generate the correct pseudo-random number R1And R2(ii) a On the other hand, the identity identification RID of the reader is also confidential, an attacker cannot simulate H (TID behavior), and cannot pass the authentication of the tag; thereby effectively preventing impersonation attacks. 5) The database realizes the authentication of the label by confirming whether H (TID') exists; the tag authenticates the reader by confirming whether H (TID ≧ RID') is satisfied, thereby realizing bidirectional authentication.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a lightweight RFID authentication method based on integer chaos according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The flow chart of the lightweight RFID authentication method based on integer chaos provided by the embodiment of the invention is shown in FIG. 1, and mainly comprises the following steps:
step 1, the reader generates two pseudo random numbers R1And R2And sends an authentication request Query and a pseudo random number R1And sending to the tag.
In the embodiment of the invention, the pseudo random number R1And taking the XOR result of the system time and the user password as an iterative initial value (key) and then bringing the iterative initial value into a coupled dynamic integer tent mapping lattice model for iterative generation. While pseudo-random number R2Is represented by R1Iteratively generated for an initial value of the iteration (key).
The coupled dynamic integer tent map grid model is illustrated as follows: the dynamic integer tent mapping is a nonlinear mapping formed by performing integer transformation on the tent mapping and adding dynamic parameters. The method not only keeps the characteristic of uniform distribution of tent mapping, but also overcomes the short period problem of integer tent mapping, is integer chaotic mapping with excellent performance, and is very suitable for constructing a cryptographic algorithm. The mathematical description of the dynamic integer tent map is as follows:
wherein g (n) ═ x (n) + k (n)]mod2k; (2)
In the above formula, x (n) represents the iteration result of the nth step; k (n) represents a dynamic parameter during each step of iteration, and the value of k (n) is related to the number of iteration steps; 2k-1 is the upper bound of the integer set of values of x (n); mod is the remainder taking operation.
To further obtain a well-performing crypto sequence, the dynamic integer tent maps are now coupled using a coupled-map lattice model (CML). The CML is a model which is extremely important for people to research nonlinear spatiotemporal chaos behaviors, and different values of a selected nonlinear function, the size of a system grid, a coupling coefficient and a nonlinear function parameter directly influence the complexity of a sequence generated by a coupling mapping grid system, so that the safety of a cryptosystem constructed by the CML is influenced. In order to make the time sequence generated by the system have uniform distribution characteristics, the CML structure is improved, namely, the dynamic integer tent mapping is used as a nonlinear function of a coupling mapping grid system, and the coupling mode is shown as a formula (3):
xi(n+1)=(f[xi(n)]+f[xi-1(n)]+f[xi+1(n)])mod2k (3)
in the formula, the value range of i is as follows: 0,1, …, L-1(L is the system size), xi(n +1) represents the state value obtained by the (n +1) th iteration of the ith lattice point, f (·) represents the nonlinear function of the lattice point, wherein the nonlinear function is taken as the dynamic integer tent mapping (formula (1)), and mod is the remainder operation; 2kThe number of states that the grid takes value. Each grid point value is determined by the three grid point values of the previous iteration, and each grid point can influence the three grid points of the next iteration, so that coupling among the grid points is realized, and information confusion and diffusion are facilitated.
Generation of pseudo-random numbers R in conjunction with a coupled dynamic integer tent map lattice model1The method comprises the following steps:
firstly, setting a system size L of a mapping lattice model of the coupling dynamic integer tent; for example, an embodiment of the present invention sets L-16;
then, the current time of the system is taken to be accurate to the second, and the current time and the user password are calculated according to the following rules:
initialvalue(0)=timearray(0)+pw(0);
initialvalue(1)=timearray(1)+pw(1);
initialvalue(2)=timearray(2)+pw(2);
initialvalue(3)=timearray(3)+pw(3);
initialvalue(4)=timearray(4)+pw(4);
initialvalue(5)=timearray(5)+pw(5);
initialvalue(6)=timearray(6)+pw(4);
initialvalue(7)=timearray(7)+pw(3);
initialvalue(8)=timearray(8)+pw(2);
initialvalue(9)=timearray(9)+pw(1);
initialvalue(10)=timearray(10)+pw(0);
initialvalue(11)=timearray(11)+pw(1);
initialvalue(12)=timearray(12)+pw(2);
initialvalue(13)=timearray(13)+pw(3);
initialvalue(14)=timearray(14)+pw(4);
initialvalue(15)=timearray(15)+pw(5);
the initialvalue is an iteration initial value vector, the timerray is a byte array form of the current time of the system, and pw is a byte array form of the user password.
For example, if the system current time is 2016-03-2015: 24:35, then time error [50,48,49,54,48,51,50,48,49,53,50,52,51,53], where the number represents the ASCII code of the character, excluding symbols such as dashes, colon, etc., 50 for '2', 48 for '0', 49 for '1', etc. If the user enters 123456, pw is ═ 49,50,51,52,53, 54.
It will be appreciated by those skilled in the art that the specific values referred to above are merely examples and are not limiting on the scheme itself.
And finally, substituting the initial value vector initialvalue into a coupled dynamic integer tent mapping lattice model for iteration in a step L +10 to obtain a pseudo-random number R1
Analogously, pseudo-random number R2With R1And substituting the initial value into the coupled dynamic integer tent mapping lattice model for iteration in the step L +10 to obtain the initial value.
Illustratively, two pseudo-random numbers generated in a certain authentication are:
R1=0x9DAF619CEAF5107266A9ADFDE2745BB5;
R2=0x3EEB7544396DC5EB98210D1EDFED1DBC。
step 2, after the label receives the authentication request Query, the pseudo random number is represented by R1Computing a pseudorandom number R for a key2Then Hash operation is carried out on the ID TID of the self-body to obtain H (TID), and H (TID) and pseudo-random number R are used2Exclusive OR operation ofCalculation result H (TID) & gtR2And sending the data to a reader.
In the initial stage, the tag already stores its own identity TID and the reader identity RID with reading right.
Illustratively, one may have:
TID=0x020000A6800010D00112DEE1;
RID=0x100000A6800010D001000111。
then the identity TID is subjected to Hash operation to obtain:
H(TID)=0xCE97C5BAE19A0D6B3EB1DE38B0D8815C;
h (TID) and pseudo-random number R2The result of the exclusive or operation:
H(TID)⊕R2=0xF07CB0FED8F7C880A690D3266F359C。
step 3, the reader receives H: ^ R (TID) sent by the label2Then, it is mixed with a pseudo random number R2And performing exclusive OR operation to obtain H (TID), and sending the H (TID) to a database.
Step 4, the database inquires whether certain data H (TID ') exists locally or not, so that H (TID ') is H (TID), and if the data H (TID ') does not exist, the authentication fails; if yes, H (TID ^ RID') is calculated and sent to the reader; the RID' is a locally stored reading identification with tag reading authority.
In an initial phase the database has stored a legal identity TID 'and a reader identity RID' with the reading right of the tag.
Illustratively, the calculated H (TID ≧ RID') is 0xB3CFB82F6EECA3BC34B07FF4B8F1EE 16.
Step 5, after the reader receives H (TID ^ RID') sent by the database, the H and the pseudo-random number R are combined2Performing XOR operation, and converting the operation result H (TID ^ RID ^ R)2And sending to the label; the label receives H (TID ^ RID ^ R2Then, it is first combined with a pseudo random number R2Performing exclusive-or operation to obtain H (TID '. or. RID'), calculating H (TID. or. RID) by using TID and RID stored in the calculation unit, verifying whether H (TID '. or. RID'). H (TID. or. RID) exists, and if the equation is satisfied, confirming that H (TID '. or. RID') existsPassing the certificate; otherwise, authentication fails.
Illustratively, H (TID ≧ RID ^ R2=0x8D24CD6B57816657AC9172EA671CF3AA。
To clarify what each of the above examples corresponds to, the following Table 1 is attached.
TABLE 1 legends
The scheme of the embodiment of the invention mainly has the following advantages:
(1) effective eavesdropping prevention
The communication content of the tag and the reader is transmitted after Hash operation and exclusive-or operation, even if intercepted, the transmitted content is only a series of random numbers seen by an attacker, and due to the unidirectional property of the Hash function, the attacker cannot obtain a legal tag identification TID from H (TID) and cannot obtain any useful information.
(2) Effective prevention of location tracking
Because of the participation of the pseudo-random number in each authentication, the contents of each communication in the authentication process of the same label are completely different, so that an attacker cannot lock any label from the contents of the communication, and the position tracking is avoided.
(3) Effective prevention of replay attacks
Because different pseudo random numbers are generated in each authentication process, an attacker intercepts and captures H (TID) and ^ R sent by a label in one authentication process2After the next time the reader sends out the authentication request, H (TID) < R >2Playback also fails authentication.
(4) Effective prevention of impersonation attacks
For counterfeit tags, because the TID is confidential data, after the reader initiates an authentication request, the counterfeit tags have difficulty in simulating legal response data h (TID ≧ R)2And further cannot pass the authentication of the database;
for counterfeit readers, the first one is not available to the userThe password, and thus the correct pseudo random number R cannot be generated1And R2(ii) a On the other hand, the id RID of the reader is also kept secret, and an attacker cannot simulate H (TID ≧ RID) and cannot pass authentication of the tag.
(5) Implementing two-way authentication
The database realizes the authentication of the label by confirming whether H (TID') exists; the tag authenticates the reader by confirming whether H (TID ≧ RID') is established or not.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (3)

1. A lightweight RFID authentication method based on integer chaos is characterized by comprising the following steps:
the reader generates two pseudo-random numbers R1And R2And sends an authentication request Query and a pseudo random number R1Sending to the label; wherein the pseudo-random number R2From pseudo-random numbers R1Iteration generation;
after the label receives the authentication request Query, the pseudo random number is represented by R1Computing a pseudorandom number R for a key2Then put its own bodyHash operation is carried out on the part identification TID to obtain H (TID), and H (TID) and pseudo-random number R are used2XOR operation result H (TID) & gtR2Sending the data to a reader;
h (TID) ≧ R sent by the reader receiving the label2Then, it is mixed with a pseudo random number R2Performing XOR operation to obtain H (TID), and then sending H (TID) to a database;
the database inquires whether certain data H (TID ') exists locally or not, so that the H (TID ') is H (TID), and if the H (TID ') does not exist, the authentication fails; if yes, H (TID ^ RID') is calculated and sent to the reader; the RID' is a locally stored reading identifier with tag reading authority;
after receiving H (TID ^ RID ') sent by the database, the reader combines the H (TID ^ RID') with the pseudo-random number R2Performing XOR operation, and converting the operation result H (TID ^ RID ^ R)2And sending to the label; the label receives H (TID ^ RID ^ R2Then, it is first combined with a pseudo random number R2Performing exclusive-or operation to obtain H (TID '. gtoreq.RID'), calculating H (TID. gtoreq.RID) by using the TID and the RID stored in the exclusive-or operation, verifying whether H exists (TID '. gtoreq.RID') (H (TID. gtoreq.RID)), and if the equation is satisfied, passing the authentication; otherwise, authentication fails;
and the pseudo-random number R1 is generated by taking the XOR result of the system time and the user password as an iteration initial value and then being introduced into a coupled dynamic integer tent mapping lattice model for iteration.
2. The integer chaos-based lightweight RFID authentication method according to claim 1,
setting the system size L of the coupled dynamic integer tent mapping lattice model to be 16;
the current time of the system is taken, the accuracy is up to the second, and the system and the user password are operated according to the following rules:
initialvalue (0)=timearray (0)+pw (0);
initialvalue(1)=timearray(1)+pw(1);
initialvalue(2)=timearray(2)+pw(2);
initialvalue(3)=timearray(3)+pw(3);
initialvalue(4)=timearray(4)+pw(4);
initialvalue(5)=timearray(5)+pw(5);
initialvalue(6)=timearray(6)+pw(4);
initialvalue(7)=timearray(7)+pw(3);
initialvalue(8)=timearray(8)+pw(2);
initialvalue(9)=timearray(9)+pw(1);
initialvalue(10)=timearray(10)+pw(0);
initialvalue(11)=timearray(11)+pw(1);
initialvalue(12)=timearray(12)+pw(2);
initialvalue(13)=timearray(13)+pw(3);
initialvalue(14)=timearray(14)+pw(4);
initialvalue(15)=timearray(15)+pw(5);
wherein initialvalue is an iteration initial value vector, timerray is a byte array form of the current time of the system, and pw is a byte array form of the user password;
substituting the initial value vector initialvalue into a coupled dynamic integer tent image lattice model to iterate for L +10 steps to obtain a pseudo-random number R1
3. The integer chaos-based lightweight RFID authentication method according to claim 2, wherein the pseudo-random number R2With pseudo-random numbers R1And substituting the initial value into the coupled dynamic integer tent mapping lattice model for iteration in the step L +10 to obtain the initial value.
CN201610972401.2A 2016-11-03 2016-11-03 Lightweight RFID authentication method based on integer chaos Expired - Fee Related CN106487495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610972401.2A CN106487495B (en) 2016-11-03 2016-11-03 Lightweight RFID authentication method based on integer chaos

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610972401.2A CN106487495B (en) 2016-11-03 2016-11-03 Lightweight RFID authentication method based on integer chaos

Publications (2)

Publication Number Publication Date
CN106487495A CN106487495A (en) 2017-03-08
CN106487495B true CN106487495B (en) 2019-12-20

Family

ID=58272154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610972401.2A Expired - Fee Related CN106487495B (en) 2016-11-03 2016-11-03 Lightweight RFID authentication method based on integer chaos

Country Status (1)

Country Link
CN (1) CN106487495B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218251B (en) * 2017-06-29 2022-03-22 国民技术股份有限公司 Anti-replay authentication method and system
CN108471348A (en) * 2018-02-09 2018-08-31 西南交通大学 A kind of safe decoding method of railway transponder message based on light weight chaos authenticated encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
CN101159549A (en) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method
CN101741560A (en) * 2008-11-14 2010-06-16 北京石油化工学院 Integral nonlinear mapping-based hash function constructing method
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
CN103227793A (en) * 2013-04-27 2013-07-31 无锡昶达信息技术有限公司 RFID equipment layer information security transfer method and device based on random sequence
CN103413109A (en) * 2013-08-13 2013-11-27 江西理工大学 Bidirectional authentication method of radio frequency identification system
CN105391544A (en) * 2015-11-19 2016-03-09 北京石油化工学院 Hash function construction method applicable to RFID authentication system
CN105450673A (en) * 2016-01-12 2016-03-30 吉林大学 Security protocol authentication method based on mobile RFID system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7791451B2 (en) * 2006-10-17 2010-09-07 International Business Machines Corporation Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
CN101329719B (en) * 2008-08-01 2010-11-10 西安西电捷通无线网络通信股份有限公司 Anonymous authentication method suitable for homogeneous electronic label
CN102136079B (en) * 2011-03-07 2014-08-20 中兴通讯股份有限公司 Dynamic authentication method between reader and tag card and implementing device thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard
CN101159549A (en) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method
CN101741560A (en) * 2008-11-14 2010-06-16 北京石油化工学院 Integral nonlinear mapping-based hash function constructing method
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
CN103227793A (en) * 2013-04-27 2013-07-31 无锡昶达信息技术有限公司 RFID equipment layer information security transfer method and device based on random sequence
CN103413109A (en) * 2013-08-13 2013-11-27 江西理工大学 Bidirectional authentication method of radio frequency identification system
CN105391544A (en) * 2015-11-19 2016-03-09 北京石油化工学院 Hash function construction method applicable to RFID authentication system
CN105450673A (en) * 2016-01-12 2016-03-30 吉林大学 Security protocol authentication method based on mobile RFID system

Also Published As

Publication number Publication date
CN106487495A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
Qadir et al. A review paper on cryptography
US10944575B2 (en) Implicitly certified digital signatures
Kulseng et al. Lightweight mutual authentication and ownership transfer for RFID systems
US10148422B2 (en) Implicitly certified public keys
Liu et al. A secure data backup scheme using multi‐factor authentication
JPWO2019093478A1 (en) Key exchange device, key exchange system, key exchange method, and key exchange program
CN111404693A (en) Reverse password firewall method suitable for digital signature
Huszti et al. A simple authentication scheme for clouds
Baek et al. Secure and lightweight authentication protocol for NFC tag based services
CN113079177B (en) Remote sensing data sharing method based on time and decryption frequency limitation
CN106487495B (en) Lightweight RFID authentication method based on integer chaos
Schwab et al. Entity authentication in a mobile-cloud environment
Liu et al. Security weaknesses in arbitrated quantum signature protocols
Rahnama et al. Securing RFID-based authentication systems using ParseKey+
CN111245615B (en) Digital signature password reverse firewall method based on identity
CN104980280B (en) A kind of RFID safety authentication based on Cai Shi multi-scroll chaotic sequence
Fan et al. Eland: an efficient lightweight anonymous authentication protocol applied to digital rights management system
CN114117392A (en) Security verification code obtaining method based on paillier encryption
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
Salim et al. Applying geo-encryption and attribute based encryption to implement secure access control in the cloud
Boonkrong Authentication and Access Control
Abyaneh On the privacy of two tag ownership transfer protocols for RFIDs
Shariq et al. Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
Li et al. Asymmetric Cryptography Based Unidirectional Authentication Method for RFID
Brandstetter et al. On the Memory Fault Resilience of TLS 1.3

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191220