Unlock instant, AI-driven research and patent intelligence for your innovation.

RFID two-way authentication method based on asymmetric key and hash function

An asymmetric key and two-way authentication technology, applied in digital transmission systems, user identity/authority verification, electrical components, etc., to achieve the effect of solving Hash conflicts

Active Publication Date: 2017-02-08
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The object of the present invention is to propose a kind of RFID two-way authentication method based on asymmetric key and Hash function, for solving the existing problems existing in the RFID security protocol based on Hash function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID two-way authentication method based on asymmetric key and hash function
  • RFID two-way authentication method based on asymmetric key and hash function
  • RFID two-way authentication method based on asymmetric key and hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] RFID mutual authentication methods based on asymmetric keys and Hash functions include:

[0058] Step 1001: The reader sends the request information to the tag.

[0059] Step 1002: After the tag receives the request information, it sends the tag identifier DID encrypted with the public key to the reader.

[0060] Step 1003: The reader receives the tag identifier DID encrypted by the public key and decrypts it with the private key to obtain the tag identifier ID.

[0061] Step 1004: The reader forwards the tag identifier ID to the database, and the database searches the corresponding public key encrypted digital string Dnum and the public key encrypted item information DM according to the tag identifier ID, and encrypts the public key The digital string Dnum and the item information DM encrypted by the public key are sent to the reader.

[0062] Step 1005: The reader decrypts the digital string Dnum encrypted by the public key and the item information DM encrypted by the public k...

Embodiment 2

[0074] RFID mutual authentication methods based on asymmetric keys and Hash functions include:

[0075] Step 2001: The reader sends the request information to the tag.

[0076] Step 2002: After the tag receives the request information, it sends the tag identifier DID encrypted with the public key to the reader.

[0077] Step 2003: The reader receives the tag identifier DID encrypted by the public key and decrypts it with the private key to obtain the tag identifier ID.

[0078] Step 2004: The reader forwards the tag identifier ID to the database, and the database searches the corresponding public key encrypted digital string Dnum and the public key encrypted item information DM according to the tag identifier ID, and encrypts the public key The digital string Dnum and the item information DM encrypted by the public key are sent to the reader.

[0079] Step 2005: The reader decrypts the digital string Dnum encrypted by the public key and the item information DM encrypted by the public k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an RFID bidirectional authentication method based on an asymmetric key and a HASH function in the technical field of information security, comprising: a reader sending request information to a tag; after receiving the request information, the tag sending a tag identifier (DID) encrypted by a public key to the reader; the reader receiving the tag identifier (DID) encrypted by the public key and decrypting same with a private key to obtain a tag identifier ID; the reader, according to the tag identifier ID, obtaining a number string (num) for Hash function authentication, and judging whether the tag is a legal tag, and when the tag is a legal tag or not, updating the number string (num). The present invention effectively avoids the stealing of and attack on a Hash function without increasing the amount of calculations of a tag, guarantees the security of number string (num) updating, and solves the problem of Hash collisions.

Description

Technical field [0001] The present invention belongs to the technical field of information security, and in particular relates to an asymmetric key and Hash function [0002] Several RFID mutual authentication methods. Background technique [0003] The Internet of Things is an important part of the new generation of information technology. "The Internet of Things is the Internet that connects things", and its user end extends and extends to any article and article for information exchange and communication. The Internet of Things is an application expansion of the Internet through the integration of intelligent perception, recognition technology, ubiquitous computing, and ubiquitous networks. [0004] The RFID system of the Internet of Things generally consists of three parts when performing identity authentication: the Internet of Things Information System (EPC-IS) built on the Internet, the reader (Reader), and the tag (Tag). If it is an internally closed system, EPC-IS can be r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3242H04L9/0891H04L2209/805
Inventor 苑津莎胡岳戚银城
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)