Radio frequency identification two-way authentication method based on ellipse curve

An elliptic curve and two-way authentication technology, applied in the field of information security, can solve problems such as high computational complexity, poor security performance, and high consumption of storage resources, and achieve the effects of reducing resources, improving efficiency, and reducing data length

Inactive Publication Date: 2014-04-02
西安电子科技大学昆山创新研究院 +1
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to propose a RFID two-way authentication method based on elliptic curves to solve the above-mentioned problems that the existi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification two-way authentication method based on ellipse curve
  • Radio frequency identification two-way authentication method based on ellipse curve

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] The two-way authentication method between the tag and the reader in the RFID system proposed by the present invention is based on the elliptic curve cryptography in public key cryptography, and is known to be implemented based on the elliptic curve on the finite field GF(q), where q is The length is the order of a finite field of 160 bits, and the base point on the elliptic curve is P.

[0041] The parameters required in the authentication process include: the identity ID of the reader R , The public key Q of the reader R =s R P, the private key of the reader s R , The identity ID of the label T , The tag's public key Q T =s T P, the private key of the label s T , The certificate of the label CERT, where the reader public key Q R The length is 32bit, the tag public key Q T The length is 32bit.

[0042] Reference figure 1 , The two-way authentication process of the present invention is as follows:

[0043] Step 1. The trusted third party injects pre-stored data into the tag.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a radio frequency identification two-way authentication method based on an ellipse curve and aims at mainly solving the problems of limited label storage resources, excessively-high calculation complexity and poor communication security of the existing RFID and a SQL interference module. The radio frequency identification two-way authentication method comprises the steps of (1), sending identity information to a label through a reader; (2), reading a session key kvz in per-stored data according to the identity of the reader through the label, encrypting relative authentication information by using the session key and sending an encryption result to the reader; (3), decrypting the relative authentication information by using a key value K through the reader and sending a random number and the session key to the label; (4), checking accuracy of the random number through the label after receiving information sent by the reader and sending an intermeddle value to the reader; and (5), finishing a final authentication process through the reader by using the intermeddle value. Through the method, the two-way authentication of the label and the reader is realized; calculation amount and occupied resources of the label are reduced; the communication safety is ensured; and the method is better applicable to an RFID (Radio Frequency Identification Device) system with limited resources.

Description

Technical field [0001] The invention belongs to the technical field of information security, and particularly relates to a radio frequency identification RFID two-way authentication method, which is mainly applied to the communication between a reader and a tag in a two-way authentication RFID system. Background technique [0002] Radio Frequency Identification RFID is a key technology used to realize object identification in the Internet of Things, and has been widely used in various fields such as transportation, logistics, medical treatment, and production. Because it uses a non-contact way to realize automatic identification of objects, this open link makes security problems very serious, such as object tracking, eavesdropping, tampering, and playback. The incomplete security mechanism of RFID communication system restricts its large-scale application. [0003] The RFID system is mainly composed of three parts: tags, readers and back-end servers. The tag is attached to the ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K17/00H04L9/32H04L9/30
Inventor 董庆宽霍玮光陈原谭帅帅方建平童嘉庆
Owner 西安电子科技大学昆山创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products