An ultra-lightweight RFID two-way authentication method

A two-way authentication and ultra-lightweight technology, applied in the field of ultra-lightweight RFID two-way authentication, can solve problems such as asynchronous attacks and full-leakage attacks, potential safety hazards, asynchronous attacks, etc., and achieve resistance to asynchronous attacks and Replay attack, ensure forward security, and ensure the effect of difference

Active Publication Date: 2016-11-02
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The ultra-lightweight authentication protocol ensures that the resources used by the label side for the authentication process are few, but the current ultra-lightweight authentication protocols, such as: UMAP protocol family, SASI protocol, Gossamer protocol, RAPP protocol, etc., all have security risks
(1) The UMAP protocol family, through active attack methods such as interception and tampering of publicly transmitted data during the protocol authentication process, will cause asynchronous attacks and full-leakage attacks
(2) The SASI protocol will be broken by the untraceability model and is not untraceable
(3) The Gossamer protocol has security risks of asynchronous updates
(4) The RAPP protocol will be subject to asynchronous attacks and full leak attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An ultra-lightweight RFID two-way authentication method
  • An ultra-lightweight RFID two-way authentication method
  • An ultra-lightweight RFID two-way authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below in conjunction with accompanying drawing, the technical scheme of invention is described in detail:

[0052] The bitwise operation RR(X, Y) involved in the present invention is aimed at hiding secret data, and after negating X, the displacement operation is performed on the negated X according to the displacement number determined by Y. Two examples of bitwise operation RR(X, Y) that can be used in the present invention are given below.

[0053] (1) Bitwise operation RR(X, Y): record the bit number n of each bit of Y with a value of 1 1 ,n 2 ,...,n k , compare the operand X with the recorded bit number n 1 ,n 2 ,...,n k Corresponding bit ,..., To invert the value, remember that the operand X after bitwise inversion is X’:

[0054] X'=Reverse(X,Y);

[0055] Then use the value of the operand Y modulo its data length as the number of left shift digits, and perform a left shift operation on X':

[0056] RR(X,Y)=Rot(X',Y).

[0057] Take two 8bit data X=001...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ultra-lightweight RFID mutual authentication method, and belongs to the technical field of RFID. With a negation cyclic displacement operation processing tag and data stored by a rear-end database, secret data are greatly hidden. According to the authentication method, tag authentication is firstly performed, then a stage of mutual authentication is performed, and information stored by a reader-writer and an electronic tag is updated after success of mutual authentication so that forward security is guaranteed. New and old authentication information stored by the electronic tag is combined with resistance replay aggression data M which are designed in the authentication process by utilizing secret key information of the new and old authentication information so that non-synchronous aggression and replay aggression are effectively resisted.

Description

technical field [0001] The invention discloses an ultra-lightweight RFID bidirectional authentication method, which belongs to the technical field of RFID. Background technique [0002] Radio Frequency Identification (RFID, Radio Frequency Identification) is a technology that identifies specific targets through radio signals and can read and write related data. In the identification process, RFID technology does not require artificial visual perception, has a long identification distance, and has a strong ability to adapt to harsh working environments. At present, RFID technology is widely used in a wide range of fields, such as electronic passports and logistics management. [0003] A typical RFID system consists of three parts: electronic tags, readers and back-end databases. In the field of RFID authentication protocol research, it is considered that the channel between the reader and the back-end database is safe. Due to the characteristics of wireless transmission, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 秦小麟王超刘亚丽
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products