Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing RFID authentication method and system based on symmetric key pool and quadratic remainder

A symmetric key and quantum computing technology, which is applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as insufficient security, slow identification process, and accelerated power consumption, so as to make up for the lack of security. Effect

Active Publication Date: 2021-08-31
RUBAN QUANTUM TECH CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing identity authentication scheme based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server, and is not suitable for applications with a very small storage capacity. RFID device
Moreover, the security of the symmetric key algorithm for identification is not high enough: on the one hand, using the same symmetric key multiple times may lead to insufficient security of the key or even being cracked; on the other hand, any party with a symmetric key can The encrypted information is decrypted, so that the encrypted information can be decrypted by illegal objects other than legal objects, and the security is not high enough
[0006] 2. The existing identity authentication scheme based on the asymmetric key pool, because the asymmetric key cannot be used publicly, it must be encrypted to resist quantum computing, so the entire identity authentication process needs to use the encryption algorithm to encrypt the asymmetric key encrypted protection
Therefore, this method increases the amount of calculation for RFID devices, which may slow down the identification process; for battery-powered RFID, it will accelerate the consumption of power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and quadratic remainder
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and quadratic remainder
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and quadratic remainder

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0068] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0069] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to an anti-quantum computing RFID authentication method and system based on a symmetric key pool and a quadratic remainder. A key card, the key card of the requesting party stores a symmetric key unit, its own identity, a true random number, a public key, and a key pointer address corresponding to the symmetric key unit. A symmetric key is stored, and the method can reduce the storage cost in the key card of the requesting party, and improve the security during authentication interaction between the two parties.

Description

technical field [0001] This application relates to the field of secure communication technology, in particular to a quantum computing-resistant RFID authentication method and system based on a symmetric key pool and quadratic remainder Background technique [0002] Radio Frequency Identification (RFID) is the abbreviation of Radio Frequency Identification. RFID radio frequency identification technology is an earlier technology. In the 1950s, the theory of RFID radio frequency identification technology was developed. In the 1970s, some earlier RFID applications appeared, and RFID gradually entered the commercial stage. Since the 1980s, with the increasing attention to the standardization of RFID technology, RFID products have been more and more widely used. The principle is to conduct non-contact data communication between the reader and the tag to achieve the purpose of identifying the target. The application of RFID is very extensive. At present, typical applications inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0822H04L9/0852H04L9/0866H04L9/0869H04L9/0897H04L9/3236H04L63/045H04L63/0853H04L63/0876
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products