期刊文献+

基于椭圆曲线密码的无线射频识别双向认证协议 被引量:6

Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography
在线阅读 下载PDF
导出
摘要 针对无线射频识别(RFID)中阅读器与标签之间的无线通信安全问题,基于椭圆曲线密码算法,提出一种RFID双向认证协议。描述新协议过程,给出安全性分析,该方案不仅提供了RFID系统中阅读器与标签的双向认证,而且满足防范重放攻击、窃听攻击、中间人攻击等安全要求,并利用BAN逻辑证明新协议的安全性。安全性分析结果表明,该协议基于椭圆曲线离散对数困难问题,与现有公钥密码体制相比,安全强度高、密钥长度短、存储量小,且具有较高的通信效率。 Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography (ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new protocol and gives the safety analysis,the proposed protocol not only provides two-way authentication RFID reader and tag system,and meets the protecting against replay attacks,eavesdropping attacks,middle attacks and other security requirements.The security new protocol is proved by BAN logic.Security analysis result shows that the security of ECC is based on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP),comparing with other asymmetric cryptography,ECC has stronger security,shorter key length,smaller storage capacity and it has high communication efficiency.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第1期196-200,共5页 Computer Engineering
基金 国家自然科学基金(61370188) 北京市支持中央高校共建项目-青年英才计划 中央高校基本科研业务费专项资金项目
关键词 无线射频识别 椭圆曲线密码 双向认证协议 BAN逻辑 安全 mutual authentication protocol BAN logic security
  • 相关文献

参考文献3

二级参考文献22

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Sarma S E,Weis S A,Engels D W.RFID systems and security and privacy implications[C]//Proc of the4th In-ternational Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer-Verlag,2003:454-469.
  • 3Weis S A,Sarma S E,Rivest R L,et al.Security and pri-vacy aspects of low-cost radio frequency identification systems[C]//Proc of the1st International Conference on Security in Pervasive Computing,2004:201-202.
  • 4Ohkubo M,Suzuki K,Kinoshita S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]//Proc of the2004Symposium on Cryptography and In-formation Security,Sendai,Japan,2004:719-724.
  • 5Henrici D,Muller P.Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]//Proc of the2nd IEEE Annual Conference on Pervasive Computing and Communica-tions Workshops,Washington,2004:149-153.
  • 6Rhee K,Kwak J,Kim S,et al.Challenge-response based RFID authentication protocol for distributed database en-vironment[C]//LNCS3450:Proc of the2nd International Conference on Security in Pervasive Computing(SPC2005).Berlin:Springer-Verlag,2005:70-84.
  • 7Yang J.Mutual authentication protocol for low-cost RFID[C]//Proc of Workshop on RFID and Lightweight Crypto,Graz,Austria,2005:17-24.
  • 8Weis S,Sarma S,Rivest R. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[A].Berlin,Germany,2003.454-469.
  • 9Ohkubo M,Suzuki K,Kinoshita S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID[A].Sendai,Japan,2004.719-724.
  • 10Henrici D,Muller P. Hash-based Enhancement of Location Privacy for Radiofrequency Identification Devices Using Varying Identifiers[A].Orlando,USA,2004.149-153.

共引文献18

同被引文献57

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部