CN110650019B - RFID authentication method and system based on PUF and security sketch - Google Patents

RFID authentication method and system based on PUF and security sketch Download PDF

Info

Publication number
CN110650019B
CN110650019B CN201910891519.6A CN201910891519A CN110650019B CN 110650019 B CN110650019 B CN 110650019B CN 201910891519 A CN201910891519 A CN 201910891519A CN 110650019 B CN110650019 B CN 110650019B
Authority
CN
China
Prior art keywords
reader
writer
authentication
label
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910891519.6A
Other languages
Chinese (zh)
Other versions
CN110650019A (en
Inventor
杨得新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou City Polytechnic
Original Assignee
Guangzhou City Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou City Polytechnic filed Critical Guangzhou City Polytechnic
Priority to CN201910891519.6A priority Critical patent/CN110650019B/en
Publication of CN110650019A publication Critical patent/CN110650019A/en
Application granted granted Critical
Publication of CN110650019B publication Critical patent/CN110650019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks

Abstract

The invention discloses an RFID authentication method and system based on PUF and security Sketch (Secure Sketch), the method comprises: the reader obtains a first unclonable function and a randomly generated key k according to calculation, generates an inquiry request by using a security sketch and sends the inquiry request to a label; the tag obtains a reader identity verification identifier by using a security rough analysis inquiry request; judging whether the reader-writer identity authentication identification is consistent with a prestored reader-writer identity identification or not, if not, failing authentication, and if so, continuing to execute; the tag encrypts the tag identity according to the key k to generate an authentication request and sends the authentication request to the reader-writer; and the reader decrypts the authentication request to obtain a tag identity verification identifier, inquires whether the tag identity identifier consistent with the tag identity verification identifier exists in the database, and if not, the authentication fails, and if so, the authentication is successfully passed. The invention can solve the problem that the PUF output value is influenced by noise, thereby effectively improving the safety and the practicability of the RFID authentication system based on the PUF.

Description

RFID authentication method and system based on PUF and security sketch
Technical Field
The invention relates to the technical field of application of the Internet of things, in particular to a PUF (physical unclonable function) and safety sketch based RFID authentication method and system.
Background
The Radio Frequency Identification (RFID) technology is non-contact two-way communication carried out by utilizing a Radio Frequency mode, can effectively realize non-contact automatic Identification and dynamic management, and does not need manual intervention in Identification work. As a wireless version of a barcode, the RFID technology has the advantages of water resistance, magnetism prevention, high temperature resistance, long service life, large reading distance, encryption of data on a tag, larger capacity of stored data, free change of stored information, and the like, which are not possessed by barcodes. The method is widely applied to the fields of logistics, retail industry, manufacturing industry and the like. However, due to the insecurity of the wireless channel and the limited computing and storage resources of the RFID system, it is still a challenge how to design an efficient and secure RFID authentication protocol.
Physical Unclonable Functions (PUFs) are a group of miniature delay circuits, and generate a plurality of wireless unique and unpredictable random numbers by extracting unavoidable differences generated in the chip manufacturing process. Because of the impersonable and irreproducible nature of the differences that occur during chip manufacture, it is not possible for even a chip manufacturer to duplicate a set of identical random sequences from other chips, and hence PUF technology gives the chip the ability to resist counterfeiting.
However, PUFs have the disadvantage that they can cause noise during operation. The output of a PUF is not equal even when the inputs are equal due to the influence of noise. Due to the problem, the security and the practicability of the related scheme of the PUF-based RFID authentication system are not high.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a PUF and safety summary-based RFID authentication method and system, which can solve the problem in the prior art that an output value of a PUF function is affected by noise, thereby solving a potential safety hazard caused by an unsafe channel between a reader and a tag in an RFID system, and further effectively improving the safety and the practicability of the PUF-based RFID authentication system.
In order to solve the above technical problems, an embodiment of the present invention provides an RFID authentication method based on a PUF and a security profile, where an RFID authentication system includes a reader and a tag, where a PUF module for calculating a physical unclonable function is respectively built in the reader and the tag;
the method comprises the following steps:
the reader-writer utilizes a PUF module of the reader-writer to calculate a prestored initial shared key r to obtain a first unclonable function, and meanwhile, a negotiation encryption key k is randomly generated, a query request is generated by utilizing a safe and rough generation algorithm, and the query request is sent to the label; wherein the challenge request is generated according to the first unclonable function and the negotiation encryption key k;
the tag utilizes a PUF module of the tag to calculate a second unclonable function of the initial shared secret key r, and utilizes a safe and approximate recovery algorithm to analyze to obtain a reader identity authentication identifier id'RAnd negotiating an encryption key k; wherein, the reader-writer identity authentication identification id'RIs parsed according to the query request and the second unclonable function;
the tag judges the identity verification identifier id 'of the reader-writer'RWith prestored reader-writer identity identification idRWhether the two are consistent or not is judged, if not, the authentication fails and the running protocol is terminated, and if so, the next step is executed;
the tag generates a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
the reader decrypts the authentication request according to the negotiation encryption key k to obtain a tag identity verification identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if yes, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
Further, before the reader calculates a pre-stored initial shared key r by using its own PUF module to obtain a first unclonable function, the method further includes:
the reader-writer identifies the label identity id of the labelTPre-storing;
the reader generates a first random number r as an initial shared secret key, and the initial shared secret key r and the self reader identity identification idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identification idRTo carry outAnd (4) pre-storing.
In order to solve the same technical problem, the invention also provides an RFID authentication system based on the PUF and the safety sketch, which comprises a reader-writer and a label, wherein PUF modules used for calculating the physical unclonable function are respectively arranged in the reader-writer and the label;
the reader-writer is used for calculating a pre-stored initial shared key r by utilizing a PUF module of the reader-writer to obtain a first unclonable function, randomly generating a negotiation encryption key k, generating a query request by utilizing a safe and rough generation algorithm, and sending the query request to the tag; wherein the challenge request is generated according to the first unclonable function and the negotiation encryption key k;
the label is used for calculating a second unclonable function of the initial shared secret key r by utilizing a PUF module of the label, and analyzing by utilizing a safe and approximate recovery algorithm to obtain a reader-writer identity authentication identifier id'RAnd negotiating an encryption key k; wherein, the reader-writer identity authentication identification id'RIs parsed according to the query request and the second unclonable function;
the tag is also used for judging the reader-writer identity authentication identifier id'RWith prestored reader-writer identity identification idRIf not, the authentication fails and the protocol operation is terminated, and if so, the protocol operation is continued;
the label is also used for generating a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
the reader-writer is further used for decrypting the authentication request according to the negotiation encryption key k to obtain a tag identity authentication identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
Further, the reader is further configured to identify a tag identity id of the tagTPre-storing; and the system is also used for generating a first random number r as an initial shared key and identifying the initial shared key r and the self reader-writer identity idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identification idRPre-storing is performed.
Compared with the prior art, the invention has the following beneficial effects:
1. the irreproducibility of the tag data and the reader-writer data is realized by utilizing a unique excitation response mechanism of a physical unclonable function.
2. The introduction of a security profile solves the problem of unequal PUF outputs due to the influence of noise.
3. And the dynamic update of the shared key between the reader-writer and the label realizes the freshness of the session.
Drawings
Fig. 1 is a schematic flowchart of an RFID authentication method based on PUF and security profile according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an application process of an RFID authentication method based on a PUF and a security profile according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention provides an RFID authentication method based on a PUF and a security profile, where an RFID authentication system includes a reader and a tag, where a PUF module for calculating a physical unclonable function is respectively built in the reader and the tag;
the method comprises the following steps:
step S1, the reader calculates a pre-stored initial shared key r by using a PUF module of the reader to obtain a first unclonable function, randomly generates a negotiation encryption key k, generates a query request by using a safe and rough generation algorithm, and sends the query request to the label; wherein the challenge request is generated according to the first unclonable function and the negotiation encryption key k;
step S2, the label calculates a second unclonable function of the initial shared secret key r by utilizing a PUF module of the label, and obtains a reader identity verification identifier id 'through analysis by utilizing a safe and approximate recovery algorithm'RAnd negotiating an encryption key k; wherein, the reader-writer identity authentication identification id'RIs parsed according to the query request and the second unclonable function;
step S3, the label judges the reader identity authentication identifier id'RWith prestored reader-writer identity identification idRWhether the two are consistent or not is judged, if not, the authentication fails and the running protocol is terminated, and if so, the next step is executed;
step S4, the label generates a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
step S5, the reader decrypts the authentication request according to the negotiation encryption key k to obtain a label identity verification identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
Further, before the reader calculates a pre-stored initial shared key r by using its own PUF module to obtain a first unclonable function, the method further includes:
the reader-writer willTag identity id of a tagTPre-storing;
the reader generates a first random number r as an initial shared secret key, and the initial shared secret key r and the self reader identity identification idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identification idRPre-storing is performed.
It is understood that Physically Unclonable Functions (PUFs). PUFs are a set of miniature delay circuits that generate wireless, unique, unpredictable random numbers using differences that inevitably arise during the fabrication of the extraction chip. Because of the impersonable and irreproducible nature of the differences that occur during chip manufacture, even chip manufacturers cannot reproduce a set of identical random sequences from other chips, PUF technology gives chips the ability to be anti-counterfeit, but PUFs have the disadvantage of introducing noise during operation. The output of a PUF is not equal even when the inputs are equal due to the influence of noise. Due to the problem, the security and the practicability of the related scheme of the PUF-based RFID authentication system are not high.
In order to overcome the defects of the prior art, the invention provides a bidirectional security authentication method between an RFID reader-writer and a label based on PUF and security sketch, which thoroughly solves the problem that the output value of the PUF function in the prior scheme is influenced by noise, is particularly suitable for an RFID system with higher security requirement, and aims to solve the potential safety hazard caused by an unsafe channel between the reader-writer and the label in the RFID system. Meanwhile, the authenticated key agreement ensures the privacy of data transmission between the reader-writer and the tag.
It can be understood that the security problems faced by the wireless channel between the reader and the tag in the RFID system mainly include eavesdropping and tampering of data transmitted over the channel by an adversary, and counterfeiting and forgery of the communication entity. In order to meet the requirements of confidentiality, integrity and availability of system transmission, domestic and foreign experts propose various security solutions, and mechanisms for realizing the solutions mainly comprise a physical mechanism, a password mechanism and a mechanism combining the two mechanisms. In these schemes, the unique identity and the security authentication of the RFID are realized through the physical structure of the chip, which becomes a research hotspot. The physical unclonable function is one of the main technologies used to protect the identity of the tag and the reader in the current RFID security protocol. However, the existing scheme has a defect that the influence of noise on the output of the puf is ignored, and the invention introduces a safe rough technology to well solve the problem. In addition, the problems of limited energy and limited computing and storage capacity of the RFID system are solved. The method has the advantages of high safety, high efficiency and low resource consumption.
Generally, an RFID system is composed of a background database, a Reader (Reader), and a Tag (Tag), where the background database and the Reader generally use a conventional network security technology, so that a channel between the background database and the Reader is considered to be secure, and a channel between the Reader and the Tag is not protected by the conventional network security technology, so that communication between the Reader and the Tag is considered to be insecure.
Referring to fig. 2, in the embodiment of the present invention, each tag T possesses an identity id during the initialization phase of the RFID systemTAnd a physical unclonable function (puf ()), wherein the reader has an identity identifier idRAnd a physical unclonable function puf (). The background database, the reader and all the tags are pre-loaded with some information in a secure environment, and the identity of the reader is idRThe label identity is idTFirstly, the two parties exchange identity information, and an initial shared secret key r is possessed between the reader-writer and the label; in this embodiment, the reader generates a random number r as an initial shared key, and identifies r and a reader identity idRTogether with the security means to the tag.
In the embodiment of the present invention, step S1 is to generate an inquiry request by using a security profile generation algorithm, and send the inquiry request to the tag; wherein the challenge request is generated according to the first unclonable function and the negotiation encryption key k; specifically, the method comprises the following steps: reading and writingThe device calculates a first unclonable function R ═ puf (R), generates a random number k as a negotiation encryption key, and calculates s ← SS (id ← SS)RK R), and then sends an inquiry Request s to the tag; here, SS () is a secure summary generation algorithm.
Step S2: the tag calculates a second unclonable function of the initial shared key r by using a PUF module of the tag, and analyzes the second unclonable function by using a safe and approximate recovery algorithm to obtain a reader identity verification identifier and a negotiation encryption key k; the reader-writer identity authentication identifier is obtained by analyzing according to the inquiry request and the second unclonable function; specifically, the method comprises the following steps: after receiving the inquiry request sent by the reader-writer, the tag calculates a second unclonable function R' ═ puf (R); and analyzing by using a safe and rough recovery algorithm to obtain a reader identity authentication identifier and a negotiation encryption key k: id'RI | k ← Rec (R', s), where Rec () is a safe and diagrammatic recovery algorithm;
step S3 specifically: the tag verifies whether the reader identity verification identifier is consistent with a prestored reader identity identifier (id'R=idRIs there a ) If the verification is passed, the reader-writer passes the authentication of the label successfully, the protocol continues, otherwise, the label terminates the operation of the protocol.
Step S4: the tag generates a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer; specifically, the method comprises the following steps: when the reader-writer passes the authentication of the label successfully, the label generates a random number rnewUpdating the initial shared secret r ═ rnewThen, the authentication request Auth ═ E is calculatedk(idT||rnew) In which Ek(.) means to encrypt with a key k and finally send an authentication request Auth to the reader-writer;
step S5: the reader decrypts the authentication request according to the negotiation encryption key k to obtain a tag identity verification identifier id'TInquiring whether the label identity verification identification id exists in a database'TAre consistent with each otherIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication. Specifically, the method comprises the following steps: the reader-writer receives the authentication request and then reads the id'T||rnew=Dk(Auth) decrypts to obtain tag identity verification identifier id'TWherein D iskIndicates whether the key is decrypted by a key k and whether the condition id 'is satisfied in a search database'T=idTIf the label is found, the label passes the reader-writer authentication successfully, the protocol continues, otherwise, the reader-writer terminates the operation of the protocol, and finally, the r of the reader-writer is updated to be rnewAnd the whole authentication process is completed.
It should be noted that the above method or flow embodiment is described as a series of acts or combinations for simplicity, but those skilled in the art should understand that the present invention is not limited by the described acts or sequences, as some steps may be performed in other sequences or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are exemplary embodiments and that no single embodiment is necessarily required by the inventive embodiments.
It should be noted that, the invention has the following beneficial effects:
1) the invention has the functions of resisting replay attack, impersonation attack, tracking attack, physical attack and asynchronous attack.
2) The invention realizes the bidirectional authentication and the forward security between the reader-writer and the label.
3) The invention can effectively protect the unsafe channel between the reader-writer and the label.
In order to solve the same technical problem, the invention also provides an RFID authentication system based on the PUF and the safety sketch, which comprises a reader-writer and a label, wherein PUF modules used for calculating the physical unclonable function are respectively arranged in the reader-writer and the label;
the reader-writer is used for calculating a pre-stored initial shared key r by utilizing a PUF module of the reader-writer to obtain a first unclonable function, randomly generating a negotiation encryption key k, generating a query request by utilizing a safe and rough generation algorithm, and sending the query request to the tag; wherein the challenge request is generated according to the first unclonable function and the negotiation encryption key k;
the label is used for calculating a second unclonable function of the initial shared secret key r by utilizing a PUF module of the label, and analyzing by utilizing a safe and approximate recovery algorithm to obtain a reader identity authentication identifier id'RAnd negotiating an encryption key k; wherein, the reader-writer identity authentication identification id'RIs parsed according to the query request and the second unclonable function;
the tag is also used for judging the reader-writer identity authentication identifier id'RWith prestored reader-writer identity identification idRIf not, the authentication fails and the protocol operation is terminated, and if so, the protocol operation is continued;
the label is also used for generating a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
the reader is further configured to decrypt the authentication request according to the negotiation encryption key k to obtain a tag identity verification identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
Further, the reader is further configured to identify a tag identity id of the tagTPre-storing; and the system is also used for generating a first random number r as an initial shared key and identifying the initial shared key r and the self reader-writer identity idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identity labelID identificationRPre-storing is performed.
It is to be understood that the above embodiments of the system correspond to the embodiments of the method of the present invention, and the RFID authentication system based on the PUF and the security profile provided by the present invention can implement the RFID authentication method based on the PUF and the security profile provided by any one of the embodiments of the method of the present invention.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (4)

1. An RFID authentication method based on PUF and safety sketch is characterized in that an RFID authentication system comprises a reader-writer and a label, wherein PUF modules used for calculating a physical unclonable function are respectively arranged in the reader-writer and the label;
the method comprises the following steps:
the reader-writer utilizes a PUF module to calculate a pre-stored initial shared key r to obtain a first unclonable function, simultaneously randomly generates a negotiation encryption key k, utilizes a safe and rough generation algorithm to generate a query request, and sends the query request to the tag; wherein the query request is generated according to the following formula: s ← SS (id)RK R); s is the query request, R is the first unclonable function R ═ puf (R), idRFor the pre-stored reader-writer identity, SS () is a safe and rough generating algorithm;
the tag utilizes a PUF module of the tag to calculate a second unclonable function of the initial shared secret key r, and utilizes a safe and approximate recovery algorithm to analyze to obtain a reader identity authentication identifier id'RAnd negotiating an encryption key k; the reader-writer identity authentication identifier id 'is obtained through analysis according to the following formula'R:id'R||k←Rec(R',s);id'RFor the reader-writer authentication identifier, R 'is a second unclonable function R' ═ puf (R), and Rec () is a safe and rough recovery algorithm;
the tag judges the identity verification identifier id 'of the reader-writer'RWith prestored reader-writer identity identification idRWhether the two are consistent or not is judged, if not, the authentication fails and the running protocol is terminated, and if so, the next step is executed;
the tag generates a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
the reader decrypts the authentication request according to the negotiation encryption key k to obtain a tag identity verification identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
2. The PUF-and security profile-based RFID authentication method according to claim 1, wherein, before the reader calculates the first unclonable function using its own PUF module with respect to the pre-stored initial shared key r, the method further includes:
the reader-writer identifies the label identity id of the labelTPre-storing;
the reader generates a first random number r as an initial shared secret key, and the initial shared secret key r and the self reader identity identification idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identification idRPre-storing is performed.
3. An RFID authentication system based on PUF and security sketch is characterized by comprising a reader-writer and a label, wherein PUF modules used for calculating a physical unclonable function are respectively arranged in the reader-writer and the label;
the reader-writer is used for utilizing the PUF module to perform pre-stored initial shared secret key rCalculating to obtain a first unclonable function, randomly generating a negotiation encryption key k, generating a query request by using a safe and rough generating algorithm, and sending the query request to the tag; wherein the query request is generated according to the following formula: s ← SS (id)RI k R); s is the query request, R is the first unclonable function R ═ puf (R), idRFor the pre-stored reader-writer identity, SS () is a safe and rough generating algorithm;
the label is used for calculating a second unclonable function of the initial shared secret key r by utilizing a PUF module of the label, and analyzing by utilizing a safe and approximate recovery algorithm to obtain a reader identity authentication identifier id'RAnd negotiating an encryption key k; the reader-writer identity authentication identifier id 'is obtained through analysis according to the following formula'R:id'R||k←Rec(R',s);id'RFor the reader-writer authentication identifier, R 'is a second unclonable function R' ═ puf (R), and Rec () is a safe and rough recovery algorithm;
the tag is also used for judging the reader-writer identity authentication identifier id'RWith prestored reader-writer identity identification idRIf not, the authentication fails and the protocol operation is terminated, and if so, the protocol operation is continued;
the label is also used for generating a second random number rnewUpdating the initial shared key r of the label to rnewEncrypting the label identity according to the negotiation encryption key k to generate an authentication request, and sending the authentication request to the reader-writer;
the reader-writer is further used for decrypting the authentication request according to the negotiation encryption key k to obtain a tag identity authentication identifier id'TInquiring whether the label identity verification identification id exists in a database'TIf not, the authentication fails and the running protocol is terminated, if so, the initial shared secret key r of the reader-writer is updated to the second random number rnewAnd finishing the authentication.
4. PUF-based and secure profile-based according to claim 3The RFID authentication system is characterized in that the reader-writer is also used for identifying the label identity id of the labelTPre-storing; and the system is also used for generating a first random number r as an initial shared key and identifying the initial shared key r and the self reader-writer identity idRSending the information to the label so that the label can make the initial shared secret key r and the reader-writer identification idRPre-storing is performed.
CN201910891519.6A 2019-09-20 2019-09-20 RFID authentication method and system based on PUF and security sketch Active CN110650019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910891519.6A CN110650019B (en) 2019-09-20 2019-09-20 RFID authentication method and system based on PUF and security sketch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910891519.6A CN110650019B (en) 2019-09-20 2019-09-20 RFID authentication method and system based on PUF and security sketch

Publications (2)

Publication Number Publication Date
CN110650019A CN110650019A (en) 2020-01-03
CN110650019B true CN110650019B (en) 2022-06-14

Family

ID=68992210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910891519.6A Active CN110650019B (en) 2019-09-20 2019-09-20 RFID authentication method and system based on PUF and security sketch

Country Status (1)

Country Link
CN (1) CN110650019B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765677B (en) * 2021-09-30 2023-08-18 中音讯谷科技有限公司 Embedded authentication method in video transmission based on PUF
CN114039732B (en) * 2021-11-08 2024-01-19 中国人民解放军国防科技大学 Physical layer authentication method, system, equipment and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011089143A1 (en) * 2010-01-20 2011-07-28 Intrinsic Id B.V. Device and method for obtaining a cryptographic key
CN103391199A (en) * 2013-07-25 2013-11-13 南京邮电大学 RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)
CN103560879A (en) * 2013-10-09 2014-02-05 中国科学院信息工程研究所 Method for achieving lightweight authentication and key agreement
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN105959101A (en) * 2016-06-29 2016-09-21 广东工业大学 Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
CN106203579A (en) * 2016-06-30 2016-12-07 广东工业大学 A kind of safe RFID label tag random number automatic update method
CN109766966A (en) * 2018-12-21 2019-05-17 广东工业大学 A kind of RFID label tag random number synchronous updating method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009540703A (en) * 2006-06-09 2009-11-19 ヴェリサイン インコーポレイテッド Method and apparatus for providing low complexity device authentication and confidentiality

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011089143A1 (en) * 2010-01-20 2011-07-28 Intrinsic Id B.V. Device and method for obtaining a cryptographic key
CN103391199A (en) * 2013-07-25 2013-11-13 南京邮电大学 RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)
CN103560879A (en) * 2013-10-09 2014-02-05 中国科学院信息工程研究所 Method for achieving lightweight authentication and key agreement
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF
CN105959101A (en) * 2016-06-29 2016-09-21 广东工业大学 Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
CN106203579A (en) * 2016-06-30 2016-12-07 广东工业大学 A kind of safe RFID label tag random number automatic update method
CN109766966A (en) * 2018-12-21 2019-05-17 广东工业大学 A kind of RFID label tag random number synchronous updating method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Suleyman KardaşET AL.Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems.《 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications》.2011, *
基于PUF的零信息泄露的安全概略的设计与实现;万超;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20180815;全文 *
基于物理不可克隆函数的RFID双向认证;寇红召等;《计算机工程》;20130615;全文 *

Also Published As

Publication number Publication date
CN110650019A (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN100559393C (en) RFID label and reader thereof, reading system and safety certifying method
US9734322B2 (en) System and method for authenticating RFID tags
Kulseng et al. Lightweight mutual authentication and ownership transfer for RFID systems
EP2456121B1 (en) Challenge response based enrollment of physical unclonable functions
CN103699920B (en) RF identification mutual authentication method based on elliptic curve
Ranasinghe et al. Security and privacy: Modest proposals for low-cost RFID systems
Cortese et al. Efficient and practical authentication of PUF-based RFID tags in supply chains
WO2016058404A1 (en) Entity authentication method and device based on pre-shared key
CN106845304A (en) A kind of method and system for realizing reader and smart-tag authentication in rfid system
CN104115442A (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN101882197A (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN104883681A (en) Mobile RFID mutual authentication method based on dynamic shared secret key
EP2922236B1 (en) Authentication by use of symmetric and asymmetric cryptography
Yang et al. Security and privacy on authentication protocol for low-cost rfid
KR101284155B1 (en) authentication process using of one time password
CN102684872B (en) Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
Liu et al. A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.
Lee et al. Mutual authentication protocol for enhanced RFID security and anti-counterfeiting
CN110650019B (en) RFID authentication method and system based on PUF and security sketch
US11223490B2 (en) Robust computational fuzzy extractor and method for authentication
CN103218633B (en) A kind of RFID safety authentication
CN107480564B (en) Improved RFID group authentication method
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
Ranasinghe et al. Confronting security and privacy threats in modern RFID systems
CN109766966B (en) RFID tag random number synchronous updating method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant