Method for enhancing ability of protocol to resist desynchronization attacks

A desynchronization and protocol technology, applied in the computer field, can solve the problems of protocol random number collision domain, ignoring shift and other operations, etc.

Inactive Publication Date: 2018-01-26
XUZHOU MEDICAL UNIV
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing methods to enhance the protocol's ability to resist desynchronization attacks mostly start from the perspective of leaking the complexity of random numbers and the untr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing ability of protocol to resist desynchronization attacks
  • Method for enhancing ability of protocol to resist desynchronization attacks
  • Method for enhancing ability of protocol to resist desynchronization attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below.

[0030] The ultra-lightweight RFID security protocol is very suitable for the constraints of limited computing power and low cost of tags. In order to ensure the high security of the RFID system under the condition of simple atomic operations, a new type of ultra-lightweight RFID two-way authentication protocol was proposed—— KMAP, the KMAP protocol can resist desynchronization attacks, replay attacks and tracking attacks to a certain extent. In essence, the KMAP protocol introduces a new ultra-lightweight primitive—the pseudo-Kasami code (K c ), which avoids the use of unbalanced logic operations, thereby enhancing the randomness of the protocol message, and making the Hamming weight of the key unpredictable, all of which enhance the security of the KMAP protocol. However, in the desynchronization attack of the KMAP protocol, there are still zero pseudo-Kasami codes, secondary interception, replay attacks, and de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for enhancing an ability of a protocol to resist desynchronization attacks comprises the following steps: a reader sends an authentication request message to a label; the label calculates IDSnew and sends the IDSnew to the reader; the reader searches the IDSnew in a background database; if the IDSnew does not exist, the reader waits for the label to transmit IDSold and re-searches the database, and the phenomenon shows that a new key of one party of the label is not updated; if the IDSnew exists, the reader generates two random numbers n1 and n2, calculates A, B and C, and sends messages to the label; after receiving the messages A, B and C, the label extracts the random numbers n1 and n2, calculates local C', judges whether C is equal to C', calculates a D value, and sends the Dvalue to the reader; otherwise, the authentication fails, wherein D is equal to FORMULA (for the detailed formula, please refer to the abstract), and the keys and pseudonyms are finally updated; and after receiving the message D, the reader verifies whether the message D is equal to a local value D', and if yes, the corresponding keys and pseudonyms in the database are updated. According to the method, the correlation between the random numbers can be enhanced, the collision domain of unit values of the random numbers can be reduced, and thus the ability of the protocol to resist the desynchronization attacks can be enhanced, and the security of the protocol can be effectively improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for enhancing the protocol's ability to resist desynchronization attacks. Background technique [0002] With the widespread use of radio frequency identification (Radio Frequency Identification, RFID) technology in intelligent transportation, mobile medical care, digital libraries and other fields, the security issues caused by it have attracted much attention. The identifier of an RFID tag is usually unique. If the tag responds the same to the reader every time it visits, it will easily lead to tracking attacks and replay attacks against the tags. [0003] In order to maintain the freshness of the information in the RFID system authentication process, avoid the occurrence of tracking attacks, and to achieve the security of forward and backward authentication, many designers often use the secret value update mechanism in their designed security protocols. The server, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00H04W12/04H04W12/0433H04W12/122
Inventor 陈秀清马凯袁洋刘伟郝杰朴雪
Owner XUZHOU MEDICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products