Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of RFID tag and back-end database based on lightweight function set

A technology of RFID tags and databases, applied in the field of authentication of RFID tags and back-end databases, can solve problems such as increasing the probability of attackers cracking the key

Inactive Publication Date: 2017-07-14
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Reusing the same key multiple times may increase the probability of an attacker cracking the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of RFID tag and back-end database based on lightweight function set
  • Authentication method of RFID tag and back-end database based on lightweight function set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] 1. Initialization phase

[0044] When the label is produced, several lightweight functions are written in its internal memory, and these functions constitute the lightweight function set F={f 1 , f 2 ,..., f i ,..., f n}. Among them, any lightweight function f i At least the following conditions should be met:

[0045] The input can be a message of any length;

[0046] The same input results in the same output information;

[0047] The output obtained by different input is also different;

[0048] In the case of the same amount of input information, the calculation amount of the lightweight function is not higher than that of the symmetric key encryption algorithm, such as the AES algorithm with a key length of 128 bits;

[0049] The input of the function contains at least one secret value known only to the communicating parties;

[0050] Even if the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes an authentication method for a tag and a backend database in an RFID system based on a lightweight function set. The tag and the backend database have the same lightweight function set. The lightweight function set contains several lightweight functions that are different from each other. Each time the protocol is executed, the communication parties select the value of the key and random number from the lightweight function set to execute the protocol according to the key and function. The lightweight function used during the authentication process makes the cryptographic algorithm used for each authentication different. The attacker does not know the key and the value of the function selection key. Even if the attacker monitors all the communication between the tag and the back-end database, it is difficult to increase the probability of cracking the secret value, which has better security; at the same time, the tag has more Less computing time consumption; users can also add new functions that meet certain conditions to the lightweight function set according to actual needs, which has better scalability.

Description

technical field [0001] The invention relates to the technical field of label and back-end database authentication in information security, in particular to an authentication method for an RFID label and a back-end database based on a lightweight function set. Background technique [0002] The radio frequency identification (Radio Frequency Identification, RFID) system uses radio frequency technology for object identification, and its advantages mainly include: no physical contact or any other visible contact, fast reading speed, large storage space, long working distance, penetrability Strong and reusable etc. RFID is often used in logistics management, manufacturing and process control, access control system management and traffic management and other fields. While this technology brings convenience to production and life, it also arouses users' attention to information security and privacy protection. [0003] An RFID system usually consists of tags, readers and a back-e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00
Inventor 甘勇贺蕾刘书如熊坤吉星张俊松尹毅峰张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY