An RFID Security Authentication Protocol Based on Hash Function and Elliptic Curve

An elliptic curve, security authentication technology, applied in the field of RFID system security authentication, can solve the problem of low efficiency of forward channel security label retrieval and authentication, and achieve the effect of improving retrieval efficiency, avoiding repeated calculation, and ensuring the freshness of the protocol.

Active Publication Date: 2021-05-25
佳缘科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a kind of RFID security authentication agreement based on hash function and elliptic curve, has solved the problem that there is forward channel security and label retrieval authentication efficiency low in existing agreement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An RFID Security Authentication Protocol Based on Hash Function and Elliptic Curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Assuming that an illegal attacker conducts 5 illegal attacks on the tag, the access counter of the tag at this time is not synchronized with the initial secret value and the counter value and secret value stored in the background database. Set the initial counter value to 0 and the initial secret value to S t Then the data stored in the tag at this time is: encrypted value H 5 (S t ), the flag bit T is 1, and the access count value k t is 5, and the ID value IDS encrypted with the public key. The background database stores a set of values ​​indexed by ID (ID, 0, S d ), where S d with S t equal.

[0045] Specifically follow the steps below:

[0046] Step (1): The RFID reader initiates an authentication request, and at the same time requests the initial seed S r Perform a hash operation to get the hash value w, send w to the label and update the seed value S r =w;

[0047] Step (2): The RFID tag responds after receiving the reader's authentication request, and pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID security authentication protocol based on a hash function and an elliptic curve. The protocol adopts a Hash function based on a Sponge structure to ensure protocol freshness and identity authentication, and uses a pre-encrypted ID value to replace the original ID value. The background database adopts The decrypted ID value is used as an index value, and the access counter value is used for synchronization, and a flag bit is used to distinguish whether a desynchronization attack has occurred to avoid repeated calculations. The RFID security authentication protocol based on the hash function and the elliptic curve of the present invention solves the problems of forward channel security and low label retrieval authentication efficiency in the existing protocol.

Description

technical field [0001] The invention belongs to the technical field of RFID system security authentication, and relates to an RFID security authentication protocol based on a hash function and an elliptic curve. Background technique [0002] In order to ensure the security of the wireless channel in the RFID system and avoid the privacy leakage of the electronic tag, it is necessary to use a security protocol to complete the authentication of the tag during the communication process. In view of the limited resources of the RFID system, most of the security authentication protocols used in it are security protocols based on the Hash function (hash function). At present, a large number of authentication protocols based on the Hash function have been proposed, including scholars Sarma and others published "Radio- Frequency Identification: Security Risks and Challenges", the Hash-Lock protocol proposed in the paper, "Security and Privacy Aspects of Low-Cost Radio Frequency Ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/30H04L9/32H04L9/08H04L9/00H04B5/00
CPCH04B5/0062H04L9/002H04L9/0643H04L9/0891H04L9/3066H04L9/3236
Inventor 赵太飞尹航曹丹丹程敏花
Owner 佳缘科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products