Ultra-lightweight RFID mutual authentication method
A two-way authentication, ultra-lightweight technology, applied in the field of ultra-lightweight RFID two-way authentication, can solve the problems of asynchronous attacks, full leakage attacks, asynchronous attacks, security risks, etc., to resist asynchronous attacks and Effects of Replay Attacks, Guaranteed Differentiation, Guaranteed Forward Security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] Below in conjunction with accompanying drawing, the technical scheme of invention is described in detail:
[0052] The bitwise operation RR(X, Y) involved in the present invention is aimed at hiding secret data, and after negating X, the displacement operation is performed on the negated X according to the displacement number determined by Y. Two examples of bitwise operation RR(X, Y) that can be used in the present invention are given below.
[0053] (1) Bitwise operation RR(X, Y): record the bit number n of each bit of Y with a value of 1 1 ,n 2 ,...,n k , compare the operand X with the recorded bit number n 1 ,n 2 ,...,n k Corresponding bit ,..., To invert the value, remember that the operand X after bitwise inversion is X’:
[0054] X'=Reverse(X,Y);
[0055] Then use the value of the operand Y modulo its data length as the number of left shift digits, and perform a left shift operation on X':
[0056] RR(X,Y)=Rot(X',Y).
[0057] Take two 8bit data X=001...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com