Strong safety certification method based on HB+ in RFID (Radio Frequency Identification Devices) system
A technology of security authentication and labeling, which is applied in the field of information security, can solve problems such as simplicity, efficiency, increased complexity, and complex calculations that do not conform to the HB protocol family, and achieve the effect of reducing communication times, overcoming insecure factors, and simplifying the communication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The present invention is based on the HB+ protocol, and achieves the purpose of the tag being authenticated by the reader by sending messages between the tag and the reader. The complete protocol process includes r rounds, where r is a security parameter. Reader and Tag share n-bit keys x and y. Tag has a noise generator that generates a bit of noise v={0, 1|prob(v=1)=η} with the probability of η∈(0, 1 / 2). (prob(v=1) refers to the probability of v=1 happening)
[0037]During one round of authentication, Reader randomly generates n-bit sequence a and sends it to Tag. After receiving a, Tag generates n-bit random number b, calculates z, and sends (b, z) to Reader. Finally the Reader checks the correctness of z. After r rounds in this way, if the number of rounds in which the Tag responds incorrectly is less than ηr, the authentication is passed.
[0038] Combined with the flow chart below (attached figure 1 ) introduces the specific steps of the one-round certificati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 