A lightweight RFID security authentication method based on present algorithm

A security authentication and lightweight technology, applied in the field of RFID system information security, can solve problems such as desynchronization attacks, achieve the effects of fewer interaction rounds, improved trustworthiness and real-time performance, and low key length

Active Publication Date: 2020-07-03
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2007, Chien HY worked on ultra-lightweight SASI authentication protocol (H Y Chien. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(9): 337-340 ) only uses a limited number of ultra-lightweight algorithms such as XOR (exclusive OR) and cyclic shift to realize the challenge-response, and establishes two key storage units in the background database to improve the key recovery ability, but due to the ROT function The algebraic characteristics of SASI are proven to be susceptible to bit tampering (Dimitriou, T. (2005). ALightweight RFID Protocol to protect against Traceability and Cloning attacks [C] / / Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks ( SecureComm 2005), Athens, Greece, ISBN: 0769523692) Desynchronization Attacks
The protocol designed by Peris Lopez relies entirely on the reader PRNG (pseudo-random number generator) to provide freshness, which saves the computational overhead of tags, but the protocol is also vulnerable to desynchronization attacks (Li T Wang. Security analysis of two ultra-lightweight RFID authentication protocols[C] / / Proceedings of the IFIP TC-11 22nd International Information Security Conference IFIP SEC 2007.South Africa:2007:109-120) and algebraic attacks (Gidas Avoine, Xavier Carpent.Strong Authentication and Strong Integrity(SASI)Is Not That Strong[C] / / The 6th International Workshop.RFIDSec2010.Turkey: Istanbul, 2010, 50-64)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight RFID security authentication method based on present algorithm
  • A lightweight RFID security authentication method based on present algorithm
  • A lightweight RFID security authentication method based on present algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] (1) Implementation steps

[0012] The authentication method includes three stages of initialization, authentication, and update. The specific interaction process between the background database, reader, and tag in the protocol is described as follows:

[0013] 1. Initialization phase

[0014] The RFID system generates a unique search name IDS (tag pseudonym) for each tag, and shares the key (K) with the database. The tag party saves its unique search name and key, and the storage unit is (IDS, K); the background database storage directory (IDS old ,K old ;IDS,K), where the key unit (IDS,K) of the database is the same as the (IDS,K) of the tag.

[0015] 2. Authentication stage

[0016] 2.1) Step 1Reader→Tag(Challenge Message):Hello

[0017] The reader sends a request response message (Hello) to the tag.

[0018] 2.2) Step 2Tag→Reader→Back-End Server(Responding Message): A

[0019] After the tag receives the request message, it takes out the current unique index na...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight class RFID safety certification method based on a Present algorithm. The lightweight class RFID safety certification method based on a Present algorithm comprises steps of realizing identity mutual certification between a label and a database through sharing an old cipher key and new cipher key and secretes information between the back end database and the label, adopting a two-way random number as a fresh quantity during a protocol execution process and performing encryption calculation, wherein certification information of a label end on the database is encrypted by producing the random number from a database end and the certification information of database end on the label is encrypted by the random number generated by the label end, and executing a Present encryption algorithm to verify identities of two parties in each verification process. The lightweight class RFID safety certification method based on the Present algorithm has characteristics of safety and privacy protection, can better resist various attacks coming from the outside of the RFID system, can protect content privacy, position privacy and front and back safety and resists replay attacks, eavesdropping attacks, etc.

Description

technical field [0001] The invention relates to a lightweight RFID security authentication method based on a Present algorithm, and belongs to the technical field of RFID system information security. Background technique [0002] RFID (Radio frequency identification) authentication protocol is an effective means to solve the security and privacy issues of radio frequency identification systems, but due to the limitations of low-cost RFID systems in terms of computing power and storage space, it is difficult to implement complex cryptographic algorithms and large-capacity Therefore, many existing RFID authentication protocols and solutions cannot fully satisfy the privacy and security attributes of wireless radio frequency systems. The lightweight RFID protocol proposed earlier completely relies on the randomness and unidirectionality of the Hash (hash) function to realize identity authentication and key update, such as DUC DN and Kwangjo Kim's anti-Dos RFID authentication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/00
CPCH04L9/002H04L9/0869H04L9/3273H04L2209/805
Inventor 高欣吕圣启张昊李新鹏闫博曹良晶刘蒙贾庆轩彭岳星
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products