期刊文献+

基于公钥密码体制的RFID三方相互认证协议的研究 被引量:2

ON RFID TRIPARTITE MUTUAL AUTHENTICATION PROTOCOL BASED ON PUBLIC KEY CRYPTOSYSTEM
下载PDF
导出
摘要 针对目前的RFID协议采用的认证和密码体制存在安全性问题及性能相对低下,提出一种基于快速NTRU(Number Theory Research Unit)密码体制的RFID三方相互认证协议。该协议首先将NTRU密码体制与异或等运算相结合从而实现服务器、阅读器及标签之间的相互认证,然后分析它的安全性及可行性,最后与其他相关认证协议进行比较分析。结果表明该协议能够为RFID系统在相互认证方面提供更高安全性及良好的性能表现,从而适应于低成本及效率较高的RFID标签。 Due to that the authentication and cryptosystem used by current RFID protocol have security problems and relatively low performance,we propose a fast NTRU cryptosystem-based RFID tripartite mutual authentication protocol. This protocol combines NTRU cryptosystem with exclusive OR operation so that achieves the mutual authentication between the server,the reader and the tag. We analyse its security and feasibility,and comparatively analyse it with other related authentication protocols as well. Result demonstrates that the protocol can provide higher security and good performance for RFID system in mutual authentication,so that it is adapted to the RFID tags with low cost and high efficiency.
作者 邓强 杨世平
出处 《计算机应用与软件》 CSCD 2015年第12期298-301,共4页 Computer Applications and Software
基金 贵阳市科学技术计划项目([2009]筑科2合同字第1-052号)
关键词 RFID NTRU密码体制 安全性 认证协议 RFID NTRU key cryptography Security Authentication protocol
  • 相关文献

参考文献13

二级参考文献54

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Yao Jun Zeng Guihua.Enhanced NTRU cryptosystem eliminating decryption failures[J].Journal of Systems Engineering and Electronics,2006,17(4):890-895. 被引量:3
  • 3KAPS J P. Cryptography for ultra-low power devices [D]. USA : Worcester Polytechnic Institute, 2006.
  • 4KAPS J P, SUNAR B. Energy comparison of AES and SHA-1 for ubiquitous computing [C]//IFIP Int Conf on Embedded and Ubiquitous Computing. Springer, Berlin,2006: 372-381.
  • 5GAUBATZ G ,KAPS J P,OZTURK E,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks [ C ]// Proc of the Third IEEE Int Conf on Pervasive Computing and Communications Workshops. Washington, DC, USA ,2005: 146-150.
  • 6ATICI A C, BATINA L, FAN J F, et al. Low-cost implementations of NTRU for pervasive security [C] // 19th IEEE Int Conf on Application-Specific Systems, Architectures and Processors. Leuven, 2008: 79-84.
  • 7Synopsys, Inc. Power compiler user guide [ K]. Release X- 2005.09.
  • 8EPCglobal tag data standards version 1.3 [ S ]. http:// www. epcglobalinc, org.
  • 9SARMA S E, WEISS A, ENGELS D W. Radio-frequency identification : secure risks and challenges [ J ]. RSA Laboratories Cryptophytes, 2003, 6 ( 1 ) : 2 - 9.
  • 10RHEE K, KWAK J, KIM S. Challenge-response based RFID authentication protocol for distributed database environment [ J ]. Lectures Notes in Computer Science 3450, Berlin : Springer-Verlag, 2005 : 78 - 84.

共引文献33

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部