Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Highly anonymous RFID authentication protocol based on Hash function and dynamic shared key

A dynamic sharing and public key technology, applied in key distribution, can solve the problems of unfavorable large-scale application of RFID systems, unsuitable encryption algorithms, low-cost label calculation and storage capacity limitations, etc., to reduce server load and speed up the authentication process , good Dos and desynchronization attack effect

Active Publication Date: 2017-09-08
JILIN UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

High-cost tags have strong computing and storage capabilities, but are not conducive to the wide-scale application of RFID systems
However, the computing and storage capabilities of low-cost tags are limited, and heavyweight encryption algorithms are not applicable, so there are more security issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Highly anonymous RFID authentication protocol based on Hash function and dynamic shared key
  • Highly anonymous RFID authentication protocol based on Hash function and dynamic shared key
  • Highly anonymous RFID authentication protocol based on Hash function and dynamic shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0051] It should be understood that terms such as "having", "comprising" and "including" as used herein do not entail the presence or addition of one or more other elements or combinations thereof.

[0052] Based on Hash function and dynamic shared key to encrypt the authentication process, a lightweight RFID security authentication protocol that satisfies strong anonymity is proposed. The protocol session messages of this protocol are all encrypted with a one-way hash function combined with a dynamically updated shared key and a random number generator. Even if the message is intercepted, there will be no danger of exposing the original data. During the authentication process, the ID is transmitted in the form of a one-time pseudonym PID, and the reader cannot obtain or calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method of information transmission in an RFID authentication process. A label can be in communication connection with a reader-writer, and the encryption method comprises the following steps: after the label receives an inquiry instruction of the reader-writer, generating a first random number, and performing xor operation on the first random number and a public key to obtain a first output; providing a label identifier, the first random number and a dynamic sequence value for a one-way Hash function as inputs so as to generate a second output; providing the second output, the public key, the first output and a reader-writer identifier for the one-way Hash function as inputs so as to generate a third output; providing the reader-writer identifier, the label identifier and the public key for the one-way Hash function so as to generate a filtering identifier; and sending a first message to the reader-writer by the label, wherein the first message comprises the second output, the third output, the filtering identifier and the dynamic sequence value. The invention further discloses a highly anonymous RFID authentication protocol based on a Hash function and a dynamic shared key.

Description

technical field [0001] Most of the existing lightweight RFID authentication protocols based on Hash function are easy to be traced after the intercepted message, which leaks the privacy of the label and does not really achieve the strong anonymity of the label. Based on a Hash function and a dynamic shared key mechanism, the invention proposes a lightweight RFID authentication protocol that truly satisfies the strong anonymity of tags. Background technique [0002] Radio Frequency Identification (RFID) is a non-contact automatic identification technology, which is recognized as one of the core technologies of the Internet of Things. The current RFID technology can identify multiple objects in parallel, even objects in a moving state can be accurately identified. This technology has been applied in various complex environments, such as logistics, libraries, and manufacturing industries. Radio frequency identification communicates and identifies objects through radio signals....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/16H04L9/08
CPCH04L9/0838H04L9/0869H04L9/16H04L9/3236H04L2209/805
Inventor 何丽莉白洪涛欧阳丹彤胡国博郑莹
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products