期刊文献+

一种抗量子攻击的RFID安全认证协议研究 被引量:6

Research on an RFID Security Authentication Protocol Against Quantum Attack
下载PDF
导出
摘要 针对量子计算机对现有RFID系统的公钥密码体制(RSA、ECC)的安全性带来了巨大冲击,提出了一种基于NTRU密码体制的RFID相互认证协议,NTRU密码体制能够抵抗量子攻击且加解密速度快、密钥短、安全性高。将NTUR密码体制和具有不可预测性的真随机数发生器相结合,保证每次传输的数据都具有不可预测性,能够有效抵抗跟踪攻击、假冒攻击、重放攻击等安全隐私问题,并且实现了三方相互认证。通过GNY逻辑对协议安全性进行了形式化证明,证明了协议的可行性,最后与其他相关协议对比分析,表明所提出协议的安全性和计算效率更高。 Aiming at the impact of quantum computers on the security of public key cryptosystems(RSA,ECC)of existing RFID systems,an RFID mutual authentication protocol based on the NTRU cryptosystem is proposed.The NTRU cryptosystem can resist quantum attacks and has the properties of fast encryption/decryption,short keys,and high security.Combining the NTUR cryptosystem with an unpredictable true random number generator to ensure that each transmitted data is unpredictable,which can effectively resist security and privacy issues such as tracking attacks,counterfeit attacks,replay attacks,and achieves tripartite mutual authentication.The formal security of the protocol was verified through GNY logic,and the feasibility of the protocol was proved.Finally,a comparative analysis with other related protocols shows that the proposed protocol has higher security and computational efficiency.
作者 刘涛 贾浪峰 郭苹 LIU Tao;JIA Lang-feng;GUO Ping(College of Communication and Information Engineering,Xi’An University of Science and Technology,Xi’An 710054,China)
出处 《控制工程》 CSCD 北大核心 2020年第3期513-519,共7页 Control Engineering of China
基金 国家自然科学基金项目(61701393) 国家重点研发计划(2018YFC0808301)。
关键词 量子攻击 NTRU RFID 认证协议 真随机数发生器(TRNG) GNY Quantum attack NTRU RFID Certification agreement True random number generator GNY
  • 相关文献

参考文献6

二级参考文献37

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Nambiar A N. RFID Technology:A Review of Its Appli-cations[A].San Francisco,USA,2009.1-7.
  • 3Sarma S E,Weis S A,Engels D W. Radio-frequency Iden-tification:Secure Risks and Challenges[J].RSA Laboratories Cryptobytes,2003,(01):2-9.
  • 4Weis S A,Sarma S E,Rivest R L. Security and Privacy Aspects of Low-cost Radio Frequency Identification Sys-tems[A].Boppard,Germany:IEEE Press,2004.201-212.
  • 5Lee S M,Hwang Y J,Lee D H. Efficient Authentication for Low-cost RFID Systems[A].Berlin,Germany:Springer-Verlag,2005.619-627.
  • 6Molnar D,Soppera A,Wagner D. A Scalable, Delegatable Ps-eudonym Protocol Enabling Ownership Transfer of RFID Tags[A].Berlin,Germany:Springer-Verlag,2006.276-290.
  • 7Le T V,Burmester M,Medeirosde B. Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange[A].New York,USA,2007.242-252.
  • 8Tsudik G. YA-TRAP:Yet Another Trivial RFID Authentication Protocol[A].Pisa,Itlay:IEEE Press,2006.640-651.
  • 9Stephen A. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[A].Boppard,Germany:Spring-Verlag,2004.201-212.
  • 10Peris-Lopez P,Estevez-Tapiador J M,Hernandez-Castro J. EMAP:An Efficient Mutual-authentication Protocol for Low-Cost RFID Tags[A].Berlin,Germany:Springer-Verlag,2006.352-361.

共引文献18

同被引文献37

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部