期刊文献+

基于字合成运算的单标签密钥无线生成算法

A Single Tag Key Generation Algorithm Based on Syn
下载PDF
导出
摘要 现有的RFID系统中,标签与读写器之间认证用到的共享密钥都是事先设定好,但该做法存在一定的安全缺陷。为了解决该安全隐患,提出一种基于字合成运算的密钥无线动态生成算法,该算法主要运用在读写器为单个标签生成共享密钥场景。算法采用标签与读写器各自生成的随机数通过字合成运算加密动态生成共享密钥,确保共享密钥的安全性。通过安全性分析,可以得知该算法能够有效抵抗假冒攻击及暴力破解攻击等攻击方式。 In the existing RFID system, the shared key which is used in the authentication between tag and reader is set in advance, but there are some security flaws in the system. In order to solve the security problem, this paper proposes a new key wireless dynamic generation algorithm based on Syn. The algorithm uses the random number generated by the tag and the reader to generate the shared key dynamically through the Syn operation to ensure the security of the shared key. Through the security analysis, it can be found that the algorithm can effectively resist the attacks such as impersonation attack and brute force attack
作者 刘道微 Liu Daowci(Guangzhou Vocational College of Science and Technology, Guangzhou 510006, Guangdong)
出处 《电脑与电信》 2017年第6期29-30,33,共3页 Computer & Telecommunication
关键词 无线射频识别 共享密钥 字合成运算 单个标签 RFID shared key Syn single tag
  • 相关文献

参考文献5

二级参考文献52

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Henrici D. RFID Security and Privacy: Concepts, Protocols, and Architectures [M]. Berlin: Springer, 2008.
  • 3Berbain C, Billet O, Etrog J, et al. An efficient forward private RFID protocol [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:43-53.
  • 4Peris-Lopez P, Hernandez-Castro C, Estevez-Tapiador M, et al. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags [C] //Proc of the 2nd Workshop on RFID Security. Berlin: Springer, 2006: 1-12.
  • 5Chien H Y, Chen C H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J]. Computer Standards : Interfaces, 2007, 29(2): 254-259.
  • 6Karthikeyan S, Nesterenko M. RFID security without extensive cryptography [C] //Proc of SASN'05. New York: ACM, 2005: 63-67.
  • 7Duc N, Park J, Lee H, et al. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning [OL]. [2013-12-01]. http://autoidlabs, org/uploads/media/ AUTOIDLABS-WP-SWNET-016. pdf?.
  • 8Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to " privacy-friendly" tags [C] //Proc of RFID Privacy Workshop. New York: ACM, 2003:1-9.
  • 9Vaudenay S. On privacy models for RFID [C]//LNCS 4833: Proc of Advances in Cryptology-Asiacrypt 2007. Berlin: Springer, 2007: 68-87.
  • 10Juels A, Weis S A. Defining strong privacy for RFID [C] // Proc of the 5th Annual IEEE lnt Conf on Pervasive Computing and Communications Workshops. Piscataway, NJ: IEEE, 2007:342-347.

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部