Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A wireless generation method of rfid key based on rabin encryption

A key generation and key technology, which is applied in the field of radio frequency identification, can solve problems such as easy leakage of shared keys, and achieve the effects of avoiding security problems, resisting replay attacks, and enhancing confidentiality

Active Publication Date: 2019-10-22
GUANGDONG UNIV OF TECH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the shared key between the reader and the tag is easy to leak, and improve the security of key generation between the tag and the reader in the RFID system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless generation method of rfid key based on rabin encryption
  • A wireless generation method of rfid key based on rabin encryption
  • A wireless generation method of rfid key based on rabin encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Generating a key for a single tag is a practical application scenario type: the reader generates a shared key for a single tag, that is, a single tag key generation. The single label key generation process is as follows:

[0052] (1) The reader-writer pre-generates the first random number r1, combined with the reader-writer ID R Generate encrypted information and send message A to said tag;

[0053] (2) After the tag receives the message A, based on the stored reader ID R The first random number can be obtained Utilize the MIXBITS function to generate the second random number r2=MIXBITS(ID R ,r1), combined with the reader ID R Generate encrypted information And use Rabin encryption to generate the first verification information And send the message combination one (P, M1) to the reader;

[0054] (3) After the reader / writer receives the message combination one (P, M1), it combines the ID stored by itself R get the second random number Based on the tag ps...

Embodiment 2

[0057] Generating a unique shared key for a group of tags This type of application scenario: the reader generates a unique shared group key for a group of tags at the same time, that is: group key generation. The group key generation process is as follows:

[0058] (1) The reader generates a random number r in advance, combined with its own ID R Generate encrypted information And broadcast a "key generation request Request" and information B to the whole group of tags to notify all tags to start group key generation;

[0059] (2) After the tag in the group receives the message combination four (B, Request), it combines the stored reader ID R Can get random number And calculate the sixth verification information And send the message combination five (Pi, i) to the reader;

[0060] (3) After the reader-writer receives the message combination five (Pi, i), based on the i-th tag pseudonym IDSi stored in the reader-writer new Or the previous round of label pseudonym IDSi ...

Embodiment 3

[0063] The application scenario of generating keys simultaneously and independently for a large number of different tags: the reader generates individual keys for a large number of different tags simultaneously and independently, that is: batch key generation. The batch key generation process is as follows:

[0064] (1) The reader-writer generates a random number ri1 for the batch tags in advance, and combines the reader-writer ID R Generate encrypted information and send a message Ai to the tag;

[0065] (2) After the tag receives the message A, based on the stored reader ID R Can get random number Utilize the MIXBITS function to generate the second random number ri2=MIXBITS(ID R ,ri1), combined with the reader ID R Generate encrypted information And use Rabin encryption to generate the eleventh verification information And send the message combination eight (Ri, Mi1, i) to the reader;

[0066] (3) After the reader / writer receives the message combination eight (Ri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an RFID key wireless generation method based on Rabin encryption, which is used to solve the problem that a shared key between a reader-writer and a tag in an RFID system is easy to leak and improve the generation security of a key between a tag and a reader-writer. According to the method of the invention, a Rabin algorithm is used to encrypt transmitted information and generate a shared key, so that the confidentiality of information is improved. The pseudonym of a tag is updated in time after a key is generated, so that the identity of the tag is hidden, and the privacy information of the tag is protected. Through security analysis, the method can resist replay attack, fake attack, denial-of-service attack, man-in-the-middle attack, de-synchronization attack, passive attack and other malicious attacks. In addition, the tag end needs no random number generator, and a random number can be generated only through simple data operation. Thus, the hardware requirement for tags is reduced, and the cost of tags is further reduced.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a method for generating an RFID system key. Background technique [0002] RFID is a non-contact automatic identification technology that automatically identifies target objects through radio frequency signals. The RFID system generally consists of three parts: tags, readers and back-end databases. The tag is composed of a coupling element and a chip, and each tag has a unique electronic code, which is used to store information that needs to be identified and transmitted. The reader can read the tag information through the radio frequency signal, and then transmit the information to the back-end database. The information transmission between the reader and the back-end database belongs to wired transmission, which is generally considered safe and reliable. In the existing RFID system, the shared key is used for authentication and identification between th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 凌捷黄琪谢锐龚怡
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products