Hash function based RFID (Radio Frequency Identification Devices) authentication method

An authentication method and function technology, applied in the field of identity authentication, can solve the problems of authentication confusion, information leakage, and the legitimacy of the unauthenticated reader, so as to avoid potential security risks and solve the effect of location leakage.

Inactive Publication Date: 2012-07-25
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, ①Hash-lock protocol fixedly transmits the key value hash calculation result during the authentication process, that is, H(key), which may easily cause the position of the electronic tag to be leaked
②In the last step of authentication, the electronic tag sends its ID to the reader in plain text, which is easy to be stolen by attackers, resulting in information leakage
The random Hash-lock protocol also has a security risk of transmitting IDs in clear text
③The Hash-Chain protocol is a one-way authentication protocol, which only authenticates the legitimacy of the electronic tag, without authenticating the legitimacy of the reader, so there is a certain security risk
④ At present, many commonly used authentication protocols are based on the Hash function, and the Hash function maps a large-scale input field to a small-scale output field. This feature is easy to cause Hash value conflicts, that is, two different If the key value corresponds to the same Hash value, this will naturally bring confusion and security risks to the authentication
[0007] It can be seen that the existing authentication process based on the Hash function has security vulnerabilities such as location leakage, plaintext transmission of ID information, one-way authentication, and Hash value conflicts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash function based RFID (Radio Frequency Identification Devices) authentication method
  • Hash function based RFID (Radio Frequency Identification Devices) authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0023] On the basis of the currently existing Hash-lock authentication protocol, the present invention proposes an improved RFID authentication method based on Hash function. Such as figure 1 As shown, the method is specifically:

[0024] First, the present invention introduces two different Hash functions H and G. Here H and G refer to Hash functions constructed by different methods, for example, one Hash function can be selected to be composed of MD5 algorithm, and the other Hash function can be composed of SHA-1 algorithm. Introduce a random number module in the backend database. Before the authentication starts, the electronic tag stores its own ID, and the back-end database stores the IDs of all legal electronic tags. The specific authentication steps are as follows:

[0025] Step 1. A random number R is generated by the random number module in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Hash function based RFID (Radio Frequency Identification Devices) authentication method capable of preventing security breaches, i.e. position leakage, plaintext transmission ID (Identification) information, one-way authentication, Hash value conflict, and the like. The authentication method comprises the following steps: a reader-writer sends an authentication request and a random number R generated by a back-end database to an electronic tag; the electronic tag calculates a data pair, i.e. (H(ID||R) and G(ID||R)), and sends to the back-end database; the back-end database calculates H(IDi||R) and G(IDi||R) for all electronic tag IDi stored by the back-end database; if H(IDk||R)=H(ID||R) and G(IDk||R)=G(ID||R), the back-end database calculates G(H(IDk)||R) and sends to the electronic tag and also destroys the random number R stored by the back-end database; and the electronic tag calculates G(H(ID)||R) by utilizing self ID and compares with a receiving value,if the G(H(ID)||R) is equal to the receiving value, authentication is determined to pass.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an RFID authentication method based on a Hash function. Background technique [0002] Radio Frequency Identification (RFID, Radio Frequency Identification) is a non-contact automatic identification technology. Its basic principle is to use radio frequency signals and space coupling transmission characteristics to realize automatic identification of recognized objects. The RFID system generally consists of three parts, namely electronic tags, readers and back-end databases. Among them, the electronic tag stores various information of related objects, and the reader can read the information in the electronic tag in a non-contact manner within a certain range, and can write the processed information into the electronic tag. [0003] As an emerging technology, RFID has been widely used in warehouse management, parking lot management, anti-theft system, animal managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06F7/58
Inventor 高飞黎恒孙成
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products