Two-way authentication method of radio frequency identification based on elliptic curve

An elliptic curve, two-way authentication technology, applied in the field of information security, can solve the problems of poor security performance, consumption of storage resources, and high computational complexity, and achieve the effects of improving efficiency, reducing resources, and reducing data length.

Inactive Publication Date: 2016-08-17
西安电子科技大学昆山创新研究院 +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to propose a RFID two-way authentication method based on elliptic curves to solve the above-mentioned problems that the existing party cannot perform tag-to-reader authentication, and the problems of high computational complexity, high consumption of storage resources, and poor security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way authentication method of radio frequency identification based on elliptic curve
  • Two-way authentication method of radio frequency identification based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The two-way authentication method between the tag and the reader in the RFID system proposed by the present invention is based on the elliptic curve cryptography in the public key cryptography, and is known to be realized based on the elliptic curve on the finite field GF(q), where q is The length is the order of the finite field of 160 bits, and the base point on the elliptic curve is P.

[0041] The parameters required in the authentication process include: reader ID R , the public key Q of the reader R =s R P, the private key s of the reader R , the ID of the tag T , the tag’s public key Q T =s T P, the tag's private key s T , the tag's certificate CERT, where the reader public key Q R The length of is 32bit, the tag public key Q T The length is 32bit.

[0042] refer to figure 1 , the two-way authentication process of the present invention is as follows:

[0043] Step 1, the trusted third party injects pre-stored data into the tag.

[0044] (1a) The trust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a radio frequency identification two-way authentication method based on an ellipse curve and aims at mainly solving the problems of limited label storage resources, excessively-high calculation complexity and poor communication security of the existing RFID and a SQL interference module. The radio frequency identification two-way authentication method comprises the steps of (1), sending identity information to a label through a reader; (2), reading a session key kvz in per-stored data according to the identity of the reader through the label, encrypting relative authentication information by using the session key and sending an encryption result to the reader; (3), decrypting the relative authentication information by using a key value K through the reader and sending a random number and the session key to the label; (4), checking accuracy of the random number through the label after receiving information sent by the reader and sending an intermeddle value to the reader; and (5), finishing a final authentication process through the reader by using the intermeddle value. Through the method, the two-way authentication of the label and the reader is realized; calculation amount and occupied resources of the label are reduced; the communication safety is ensured; and the method is better applicable to an RFID (Radio Frequency Identification Device) system with limited resources.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a radio frequency identification (RFID) two-way authentication method, which is mainly applied to the communication between a reader and a label in a two-way authentication RFID system. Background technique [0002] Radio Frequency Identification (RFID) is a key technology for object identification in the Internet of Things, and has been widely used in various fields such as transportation, logistics, medical treatment, and production. Since it uses a non-contact method to automatically identify objects, this open link makes security issues very serious, such as object tracking, eavesdropping, tampering, and replay. The imperfect security mechanism of radio frequency identification RFID communication system restricts its large-scale application. [0003] The RFID system is mainly composed of three parts: tags, readers and background servers. The tag is attached to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00H04L9/32H04L9/30
Inventor 董庆宽霍玮光陈原谭帅帅方建平童嘉庆
Owner 西安电子科技大学昆山创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products