期刊文献+

基于NTRU的RFID安全认证协议研究与设计 被引量:3

Research and Design of RFID Security Authentication Protocol Based on NTRU
下载PDF
导出
摘要 为了解决RFID标签数据存储量小、运算能力弱等原因致使通常的密码算法不适用的问题,提出了一种基于NTRU公钥密码算法的RFID安全认证协议。将少计算、高安全的NTRU算法与标签认证协议相结合,对标签ID以及对应的用户信息进行制表编码,对其加密处理并在标签中直接保存密文信息,加入随机数,保证通信过程中的信息都是保密和不确定的,这样不仅解决了隐私泄露、重放攻击等安全问题,并且实现了阅读器与标签的双向认证。 In order to solve the problem that the usual cryptographic algorithm does not apply to RFID,due to the RFID tags data storage capacity is small,the computing power is not strong enough and another reasons. This paper presents an RFID security authentication protocol based on the NTRU public key cryptography algorithm. The NTRU algorithm which combined with the RFID authentication protocol is less computation and higher security then usual security authentication protocol. Tabulating the RFID tags ID and the corresponding user information,encrypting the serial number,and keeping the ciphertext information in the tags directly. In the communication process,we will apply a random number,in order to ensure the information which we want to transmit is more confidential and uncertain. By this way,we could not only solve the privacy leaks,replay attacks and other security issues,but also realize the bidirectional authentication of the reader and the RFID tags.
出处 《北京印刷学院学报》 2017年第2期22-25,共4页 Journal of Beijing Institute of Graphic Communication
关键词 RFID技术 NTRU算法 安全认证协议 隐蔽性 RFID technology NTRU algorithm security authentication protocol concealment
  • 相关文献

参考文献2

二级参考文献13

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2EPCglobal tag data standards version 1.3 [ S ]. http:// www. epcglobalinc, org.
  • 3SARMA S E, WEISS A, ENGELS D W. Radio-frequency identification : secure risks and challenges [ J ]. RSA Laboratories Cryptophytes, 2003, 6 ( 1 ) : 2 - 9.
  • 4RHEE K, KWAK J, KIM S. Challenge-response based RFID authentication protocol for distributed database environment [ J ]. Lectures Notes in Computer Science 3450, Berlin : Springer-Verlag, 2005 : 78 - 84.
  • 5MARTIN F, SANDRA D, JOHANNES W S. Strong au-thentication for RFID systems using the AES algorithm [ J ]. International Associations for Cryptology Research 2004, CHES 2004, LNCS 3156, 2004:357-370.
  • 6MAO W B. Modem cryptography: theory and practice [M].北京:电子工业出版社,2004:165-190.
  • 7HOFFSTEIN J, PIPHER J, SILVERMAN J H. NTRU: A ring-based public key crypto - system [ C ]. In Proc of ANTS-III, LNCS 1423, 1998:267 -288.
  • 8The NTRU public key cryptosystem-a tutorial [ J]. http ://www. ntru. com.
  • 9Kaya S V,Sava E. Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks Journal,2009,(01):136-152.
  • 10Paise R I,Vaudenay S. Mutual authentication in RFID:Security and privacy[A].Tokyo,Japan.ACM Press,2008.292-299.

共引文献12

同被引文献22

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部