RFID system secret key generation method and devices based on tag ID

A key generation and system key technology, applied in the field of radio frequency identification, to achieve the effect of avoiding hidden safety problems

Active Publication Date: 2016-06-29
GUANGDONG UNIV OF TECH
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An object of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a RFID system key generation method ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID system secret key generation method and devices based on tag ID
  • RFID system secret key generation method and devices based on tag ID
  • RFID system secret key generation method and devices based on tag ID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] In the traditional RFID system, the shared key between the tag and the reader is pre-set and fixed during each reading and writing process, which is vulnerable to attacks and leaks. This embodiment discloses a tag ID-based RFID system key generation method. In the method, a reader / writer generates a shared key for a tag, that is, it is used to generate a single tag key.

[0059] Before describing the generation method in detail, the meaning of each symbol is given:

[0060] R: reader;

[0061] T: label;

[0062] r: random number generated by the reader (length is L bits);

[0063] k: the shared key between the reader and the tag (the length is L bits);

[0064] ⊕: XOR operation;

[0065] ||: AND operation;

[0066] [X] L : Take the first L bits of the operation result X;

[0067] ID_L: the value of the first half of the identifier (the value of the length of the first L bits);

[0068] ID_R: the value of the second half of the identifier (the value of the last L...

Embodiment 2

[0081] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates different shared keys for a batch of tags , that is, for batch key generation.

[0082] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:

[0083] (1) The reader first broadcasts a key generation request command Request to the whole group of tags.

[0084] (2) After receiving the Request command, the tag first calculates M=ID_R⊕ID_L, and transmits the calculation result M to the reader.

[0085] (3) After the reader receives the M sent by the tag, it first calculates IDi_R⊕IDi_L through its stored IDi_R and IDi_L, and judges whether the calculation result is equal to the received M:

[0086] If they are equal, then the reader will immediately generate a random number r with a length of L bits, calculate ...

Embodiment 3

[0090] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates a common group key for a group of tags , which is used for group key generation.

[0091] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:

[0092] (1) The reader first broadcasts a key generation request command Request to the whole group of tags, which is used to inform all tags to start group key generation.

[0093] (2) After the tag in the group receives the command, the tag Ti sends the IDi_R it stores to the reader.

[0094] (3) After the reader receives the reply from the tag, the reader will compare whether the received IDi_R is completely consistent with the information stored in itself. If not, it means that there is a tag that did not respond to the command. The writer will send the Request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID system secret key generation method and devices based on tag ID. The method comprises the steps that firstly, a reader-writer determines to generate a secret key/secret keys for a tag or a batch of tags or a group of tags, determines the types of the generated secret keys and then sends a secret key generation request command to each tag, each tag feeds back corresponding information of the corresponding tag ID according to type difference, and the reader-writer and each tag generate a secret key shared by the reader-writer and the tag through certain calculation according to the information of the corresponding tag ID. By means of the secret keys, subsequent bidirectional authentication can be conducted. Based on all the types, the three types of secret key generation devices are specifically disclosed. By means of the method, read-write security of an RFID system is improved, the calculated amount at each tag end is greatly reduced, and tag cost is lowered.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a tag ID-based RFID system key generation method and device. Background technique [0002] In the RFID system, tags can be divided into two types according to their own characteristics, one is passive passive tags, and the other is active active tags. The former cannot implement security authentication protocols based on conventional encryption algorithms (such as RSA, DES, etc.) due to low cost, low computing power, and limited resource storage; at the same time, because the tags are passive, the tags are only Little energy can be obtained from the interrogator signal for information transmission, resulting in such tags being able to respond to all interrogator accesses that provide energy. The latter is superior to the former in terms of computing power and resource storage, so this type of tag can use a dynamic verification key to improve system securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04B5/00
CPCH04B5/0062H04L9/0833H04L9/0838H04L9/0869
Inventor 凌捷刘道微谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products