期刊文献+

Hash函数与椭圆曲线密码相融合的双向认证方案 被引量:2

Mutual-Authentication Scheme Based on Hash Function and Elliptic Curve Cryptography
下载PDF
导出
摘要 针对当前无线射频识别系统认证过程复杂、安全性差等缺陷,提出一种基于Hash函数与椭圆曲线密码相融合的双向认证方案,以提高无线射频识别系统通信的安全性.首先采用椭圆曲线密码对无线射频识别系统的阅读器进行身份认证;然后采用轻量级Hash函数对无线射频识别系统的标签身份进行认证与验证,大幅度减少公钥与密钥长度,降低计算开销;最后对该方案的可行性进行测试.测试结果表明,相对于其他双向认证方案,该方案能有效抵抗各种类型的攻击,安全性较高,同时降低了内存与通信的开销. Aiming at the defects of the current radio frequency identification system,such as the complexity of the authentication process,poor security and so on, we proposed a mutualauthentication scheme based on Hash function and elliptic curve cryptography,which improved the security of radio frequency identification system.Firstly,elliptic curve cryptography was used to authenticate the reader of radio frequency identification system.Secondly,lightweight Hash function was used to authenticate and verify the identity of radio frequency identification system,the length of public key and key could be reduced greatly,and computation overhead could be reduced.Finally,the feasibility of the scheme was tested by experiment.Test results show that compared with other mutual-authentication schemes,the proposed scheme can effectively resist all kinds of attacks,and the security is high,at the same time,it reduces the memory and communication overhead.
作者 黄凯锋 刘为超 李莉 HUANG Kaifeng LIU Weichao LI Li(College of Electronic Commerce, Luoyang Normal University, Luoyang 471022, Henan Province, China College of Information Technology, Luoyang Normal University, Luoyang 471022, Henan Province, China School of Computer Science, Henan University of Engineering, Zhengzhou 451191, China)
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2017年第2期340-344,共5页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:61202317) 河南省科技攻关计划项目(批准号:142102210474)
关键词 射频识别系统 密钥协商 双向认证 椭圆曲线密码 抵抗攻击 radio frequency identification system key agreement mutual-authentication elliptic curve cryptography resistance attack
  • 相关文献

参考文献5

二级参考文献65

  • 1雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 2Juels A, Weis S. Authenticating pervasive devices with human protocols E J. Lecture Notes in Computer Science, 2005,3621:293 - 308.
  • 3Nicholas J H, Manuel B. Secure human identification protocols [J]. Lecture Notes in Computer Science, 2001,2248:52 - 66.
  • 4Gilbert H, Robshaw M J B, Sibert H. HB g: increasing the security and efficiency of HB+ [C]//Pro- ceedings of The Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology. Istanbul, Turkey: Springer, 2009 : 361 : 378.
  • 5Peris-Lopez P, Hernandez-Castro J C, Estevez Tapiador J M, et al. M2AP: a minimalist mutual-authentication protocol for low-cost RFIE) tags[J]. Lecture Notes in Computer Science, 2006,4159 : 912 - 923.
  • 6Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: a real lightweight mutual authentication protocol for low cost RFID tags[M]. ES. 11: Hand of Workshop on RFID and Lightweight Crypto, 2006.
  • 7Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: an effcient mutual authentication protocol for low-cost RFID tags[J]. Lecture Notes in Computer Science,2006,4277:352 - 361.
  • 8Chien H Y. SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007,4:337 - 340.
  • 9Peris-Lopez P, Hernandez-Castro J C, gstevez-Tapiador J M, et al. Advances in ultra-lightweight cryptography for low-cost rfid tags: gossamer protocol[J] Lecture Notes in Computer Science, 2009,5379 : 56 - 68.
  • 10Gassend B, Clarke D, Devadas S, et al. Silicon physical random functions[C]//Proceedings of the 9th ACM Con[erence on Computer and Communications Security. New York: ACM, 2002:148 - 160.

共引文献44

同被引文献15

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部