Hash function construction method applicable to RFID authentication system

An authentication system and construction method technology, applied in the field of information security, can solve the problems that the public key algorithm cannot be directly applied to the RFID system, the Hash function algorithm is rarely involved, and TIDRID is not safe, etc.

Inactive Publication Date: 2016-03-09
BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the popularization of RFID technology, its security issues have become increasingly prominent. Due to the limitations of the computing power, storage capacity and energy of the electronic tags in the RFID system, the mature public key algorithm cannot be directly applied to the authentication process of the RFID system.
[0003] In the prior art, a large number of research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash function construction method applicable to RFID authentication system
  • Hash function construction method applicable to RFID authentication system
  • Hash function construction method applicable to RFID authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] The construction method described in the embodiment of the present invention is to use the data to be hashed as the iterative initial value of the coupled dynamic integer tent image lattice model, and after a certain number of iterations, output the final iterative result as a hash value, so that Hash The output length of the function is determined by the number of grids in the model. Each grid point value is an 8-bit unsigned integer, that i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Hash function construction method applicable to an RFID authentication system. The method comprises the steps of: establishing a coupled dynamic integer tent map lattice model; determining the size L of the RFID authentication system according to hardware resources and application occasions of the RFID authentication system; carrying out filling on data messages to be hashed, wherein the byte number of the messages after the filling is b, and b is a minimum integral multiple of L; dividing the messages after the filling into a plurality of groups, enabling the byte number of each group to be L, accumulating corresponding bytes of all the groups, then obtaining a remainder with regard to 256, obtaining an array whose byte length is L, and using the array as an iteration initial value; and taking the iteration initial value into the established coupled dynamic integer tent map lattice model for L steps of iteration, and using the iteration result of an L+10 step as an output value of a final Hash function. According to the invention, hashed values different in byte length can be obtained with the change of lattice number, and the hashed value of any byte length can be output.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for constructing a Hash function suitable for an RFID authentication system. Background technique [0002] As one of the important supporting technologies of the Internet of Things, radio frequency identification (RFID) technology has the advantages of automatic identification, non-contact, large capacity, fast speed, etc., and is widely used in access control, logistics management, automatic toll collection and other occasions. However, with the popularization of RFID technology, its security issues have become increasingly prominent. Due to the limitations of computing power, storage capacity and energy of electronic tags in RFID systems, mature public key algorithms cannot be directly applied to the authentication process of RFID systems. [0003] In the prior art, a large number of research results have been published for the authentication protocol of R...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0643H04L2209/805
Inventor 刘建东张啸王淑鸿赵晨
Owner BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products