CN105847009A - RFID bidirectional authentication method meeting requirement on backward security - Google Patents

RFID bidirectional authentication method meeting requirement on backward security Download PDF

Info

Publication number
CN105847009A
CN105847009A CN201610157282.5A CN201610157282A CN105847009A CN 105847009 A CN105847009 A CN 105847009A CN 201610157282 A CN201610157282 A CN 201610157282A CN 105847009 A CN105847009 A CN 105847009A
Authority
CN
China
Prior art keywords
key
label
write line
read write
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610157282.5A
Other languages
Chinese (zh)
Inventor
凌捷
刘道微
谢锐
柳毅
龚怡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610157282.5A priority Critical patent/CN105847009A/en
Publication of CN105847009A publication Critical patent/CN105847009A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a RFID bidirectional authentication method meeting a requirement on backward security. The method comprises the steps that a reader generates a random number R1 and a random number R2 of which the lengths are both L bits, works out an A value and a B value according to identifiers ID_L and ID_R, and sends the A and B values together with an authentication request command to a label; the label works out R1_T and R2_T according to the A and B values, establishes a label authenticity authentication formula by using a key KEY_T, R1_T and R2_T, works out a label authenticity authentication value C_T, and transfers the C_T value to a reader-writer; and the reader-writer puts a self-stored KEY and the generated R1 and R2 into the label authenticity authentication formula for authenticating the authenticity of the label. If the label is legal, the reader-writer works out a reader-writer authenticity authentication value D by using the current KEY and the generated random number R2, transfers the D value to the label, and updates the key. After receiving the D value transferred from the reader-writer, the label authenticates the authenticity of the reader-writer. If the legality of the reader-writer is authenticated, the label updates the self-stored key.

Description

A kind of RFID mutual authentication method meeting backward security
Technical field
The present invention relates to RF identification research field, particularly to label and read write line in a kind of rfid system it Between meet the RFID mutual authentication method of backward security.
Background technology
Radio RF recognition technology (radio frequency identification, RFID) is that one utilizes radio frequency Signal realizes the transmission of contactless information, and passes through the technology that transmitted information reaches the purpose of identification. Owing to RFID technique is to utilize wireless radio frequency channel to exchange data, therefore it is highly susceptible to external environment condition Interference and the malicious attack of assailant.If the personal information deposited in RFID label tag or business intelligence Illegally obtained Deng by the assailant of malice, huge loss can be brought to user.
For overcoming the problems referred to above, research worker proposes many authentication protocols based on PRNG, This quasi-protocol can realize security and privacy protection;It is also proposed some based on bit arithmetic and HASH letter simultaneously The lightweight RFID authentication protocol of number, but all there is potential safety hazard in these agreements or authentication efficiency is low etc. Problem.Such as, the certificate scheme that Godor G et al. proposes can not resist desynchronization attack, and assailant is permissible By playback message, make read write line and label key between the two inconsistent, thus destroy between the two Subsequent authentication (Godor G, Imre S.Hash-based mutual authentication protocol for low-cost RFID systems[C]//Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87.);Miyaji A et al. proposes Certificate scheme its essence is a search protocol, can not calculate a bidirectional identification protocol (Miyaji A, Rahman M S.KIMAP:Key-insulated mutual authentication protocol for RFID[J]. Int Journal of Automated Identification Technology,2011,3(2):61-74.);Mamun M The certificate scheme that SI et al. proposes can not resist active attack, and assailant, by constantly inquiring label, divides The return information of analysis label, it is possible to derive all key informations (the Mamun M S deposited in label completely I,Miyaji A,Rahman M S.A secure and private RFID authentication protocol under SLPN problem[C]//Proc of the 6th Int Conf on Network and System Security. Berlin:Springer,2012:476-489.);The certificate scheme that Alomair B et al. proposes is not provided that backward Personal secrets (Alomair B, Cuellar J, Poovendran R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Trans on Parallel and Distributed Systems,2012,23(8):1-10.);Du Zongyin et al. is according to genetic algorithm Relevant knowledge proposes intersection bit arithmetic, and combines XOR, Rot computing and propose CURAP agreement, but Being that CURAP is excessively simple in terms of computing, safety shows slightly not enough, and this agreement is complete in each certification simultaneously After one-tenth, label and the renewal process of read write line key between the two are excessively complicated and amount of calculation is relatively large (shuts out Zong Yin, Zhang Guoan, Yuan Honglin. ultralight amount RFID authentication protocol [J] based on intersection bit arithmetic. computer section Learn, 2013,40 (11): 35-37.);The scheme that Wang Shaohui et al. proposes can not be resisted Brute Force and be attacked, because R1 and r2 uses plaintext transmission, and therefore assailant is easy to obtain r1 and r2, uses the method for exhaustion to derive The key information deposited in outgoing label (Wang Shaohui, Liu Sujuan, Chen Danwei. meet the expansible of backward privacy RFID mutual authentication schemes [J]. Journal of Computer Research and Development, 2013,50 (6): 1276-1284.).Based on above Narration, design one safety bidirectional identification protocol there is important Research Significance and practical value.
Summary of the invention
It is an object of the invention to overcome the shortcoming of prior art with not enough, it is provided that a kind of to meet backward security RFID mutual authentication method, this method solves in current rfid system certification between label and read write line and deposits In the problem of safety defect, there is safety height, authentication efficiency height, the advantage of label low cost.
The purpose of the present invention is realized by following technical scheme: a kind of RFID meeting backward security is two-way to be recognized Card method, including step:
(1) unique identifier of the label of read write line reading storage inside, is divided into two parts, is designated as ID_L, ID_R, length is L position;Read write line generates two length and is the random number R 1 and R2 of L position; Read write line utilizes ID_L and R1 to carry out XOR to obtain A, utilize ID_R and R2 to carry out XOR and obtain To B, then A, B and certification request command are sent to label in the lump;
(2), after label receives read write line transmission next A, B and certification request command, self is first taken out ID_LT and ID_RT stored, then carries out XOR by ID_LT and the A received and obtains R1_T, ID_RT and the B received is carried out XOR and obtains R2_T, then according to label self storage close Key KEY_T and calculated R1_T, R2_T set up a label authenticity verification formula, calculate To label authenticity verification value C_T;Finally, C_T value is passed to read write line;
(3) read write line is after receiving the information that label transmission comes, and self is stored by first read write line The random number R 1 and R2 of key KEY and generation substitutes into above-mentioned label authenticity verification formula, is tested Card value C, if C with C_T is unequal, then care label is to forge, and certification terminates at once;If phase Deng, then perform step (4);
(4) random number R 2 of read write line current key KEY and generation is set up a read write line true and false and is tested Card formula, is calculated read write line authenticity verification value D, D value is passed to label;Read write line is according to default Key updating formula more new key;
(5) label is after receiving the D that read write line transmits, the key KEY_T self deposited and meter The R2_T that obtains substitutes into above-mentioned read write line authenticity verification formula, is verified value D_T, if D and D_T is unequal, then explanation read write line is to forge, and certification terminates at once;If equal, then label according to The key updating formula preset updates the key self deposited.
Preferably, in described step (2), the computing formula of label authenticity verification value C_T is as follows:
C_T=[(KEY_T&R2_T&R1_T)2mod M]L
Wherein, KEY_T represents the key that label self stores, []LTake the front L position of operation result;& represents With computing, M represents modulus, M=2L-1;
In like manner, the computing formula of validation value C is as follows:
C=[(KEY&R2&R1)2mod M]L
Further, in described step (3), the key KEY of read write line self storage is divided into two kinds, A kind of is current key K_new, another kind be history used key K_old, K_old be a number Group;After receiving the C_T value that label transmits, read write line first obtains first according to K_new, R1 and R2 Validation value C`, and C` with C_T is compared,
If the two is equal, then makes KEY be equal to K_new, perform step (4);
If the two is unequal, obtaining the second validation value C`` further according to K_old, R1 and R2, C`` is a number Group, compares value all of in C`` with C_T, if the most unequal, care label is to forge, and recognizes Card terminates at once, if one of them value C``_i in C`` is equal with C_T, then makes KEY be equal to and this Key K_old_i corresponding for C``_i, performs step (4).
Preferably, in step (4), the computing formula of read write line authenticity verification value D is as follows:
D=[KEY2mod M]L&R2;
Wherein, []LTake the front L position of operation result;& represents and computing, and M represents modulus, M=2L-1;
In like manner, the computing formula of validation value D_T is as follows:
D_T=[KEY_T2mod M]L&R2_T。
Preferably, in step (4), the formula of read write line more new key is:
KEY_new=[KEY2mod M]L
Wherein, []LTake the front L position of operation result;M represents modulus, M=2L-1;
In like manner, in step (5), the formula of the key that tag update self is deposited is:
KEY_T_new=[KEY_T2mod M]L
The RFID mutual authentication method of the present invention has the advantage that and beneficial effect:
(1) method of the Hash computing encrypted transmission that the present invention discards tradition, uses and has ad eundem safety Modular arithmetic encryption method the information of transmission is encrypted, thus reduce tab end and the computing of read write line end Amount, makes the inventive method can reach the rank of lightweight;
(2) present invention abandons tab end and produces the way of random number, selects to be produced random number by read write line end, Thus reduce the target of label cost;
(3) present invention makes full use of the letter of the unique identifier ID of label shared between label and read write line Breath, reduces the introducing of information and deposits, the identifier ID of label being divided into ID_L and ID_R two parts and enters Row encrypted transmission, as the authority of two-way authentication, thus reduces the carrying cost of tab end;
(4) all of information that between label of the present invention and read write line, mutual authentication process is transmitted be all through Transmit again after encryption, safer compared with traditional transmission means, simultaneously in the information of transmitting procedure The most plural variable is unknown for assailant, thus thoroughly avoids assailant and adopt Potential safety hazard with method of exhaustion breaking cryptographic keys.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of method described in the present embodiment.
Fig. 2 is each parameter transmittance process schematic diagram in the present embodiment mutual authentication process.
Detailed description of the invention
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but the embodiment party of the present invention Formula is not limited to this.
Embodiment 1
See Fig. 1,2, first provide the implication of each symbol related in method described in the present embodiment:
R: read write line;
T: label;
KEY: the key (a length of L position) shared between read write line and label;
The unique identifier (a length of 2L position) of ID: label;
The left-half (the L position on the left side) of ID_L: tag ID;
The right half part (the L position on the right) of ID_R: tag ID;
The shared key (a length of L position) of K_new: this certification;
The shared key (a length of L position) of K_old: history certification several times;
The length of L: key;
M: modulus, M=2L-1;
Two randoms number (length is all L position) that R1 and R2: read write line produces;
: XOR;
&: with computing.
Carried out the biography of information between read write line and back-end data base by wire transmission mode in rfid system Defeated, it is considered that transmission between the two is safe, therefore regard back-end data base and read write line as one Overall.Two-way authentication detailed process between read write line and label as it is shown in figure 1, in its verification process each Parameter transmittance process sees Fig. 2, in fig. 2, and A=ID_L R1;B=ID_R R2;C= [(KEY&R2&R1)2mod M]L, represent the front L position taking operation result;D=[KEY2mod M]L &R2, represents the front L position first taking [] operation result, carries out and computing with R2.
Verification process in conjunction with Fig. 1,2 pairs of the present embodiment is described as follows:
1. read write line reads the unique identifier of label of storage inside, is divided into two parts, be designated as ID_L, ID_R, length is L position.Read write line generates two length and is the random number R 1 and R2 of L position.
Read write line utilizes ID_L and R1 to carry out XOR to obtain A, i.e. A=ID_L R1, then profit Carry out XOR with ID_R and R2 and obtain B, i.e. B=ID_R R2.
Finally A, B and certification request command Query are sent to label in the lump.
2., after label receives the information that read write line transmission comes, the Information ID _ LT self stored first is taken out And ID_RT, if read write line and label are not forgery, then ID_LT and ID_RT should wait respectively In ID_L, ID_R.
Then ID_LT and the A received is carried out XOR and obtain R1_T, i.e. R1_T=ID_L A, ID_RT and the B received is carried out XOR and obtains R2_T, i.e. R2_T=ID_R B.If Read write line and label are not forgery, then R1_T and R2_T should be respectively equal in read write line generation R1、R2。
Then label sets up one according to the key KEY_T self stored, calculated R1_T, R2_T Label authenticity verification formula, calculating label authenticity verification value C_T:
C_T=[(KEY_T&R2_T&R1_T)2mod M]L
Wherein, KEY_T represents the key that label self stores, []LTake the front L position of operation result;& represents With computing, M represents modulus, M=2L-1;
Finally, C_T value is passed to read write line.
3. after read write line receives the information that label transmission comes, the key that first self is stored by read write line R1 and R2 of KEY and generation substitutes into above-mentioned label authenticity verification formula, is verified value C:
C=[(KEY&R2&R1)2mod M]L
If C with C_T is unequal, then showing that label is to forge, certification terminates at once;If it is equal, Then continue below step.
4. the random number R 2 of read write line current key KEY and generation sets up a read write line authenticity verification Formula, is calculated read write line authenticity verification value D:
D=[KEY2mod M]L&R2;
D value is passed to label;Read write line is according to default key updating formula KEY_new=[KEY2mod M]L, more new key.
5. label is after receiving the D that read write line transmits, the key KEY_T self deposited and calculating The R2_T that obtains substitutes into above-mentioned read write line authenticity verification formula, is verified value D_T:
D_T=[KEY_T2mod M]L&R2_T。
If D with D_T is unequal, then showing that read write line is to forge, certification terminates at once;If it is equal, Then label is according to default key updating formula KEY_T_new=[KEY_T2mod M]L, update self The key deposited.If read write line and label are not forgery, then the key after tag update Key KEY_new after KEY_T_new should update with read write line is identical.
In actual applications, it is possible to label is not updated in verification process several times above, if Only with the up-to-date key of read write line as certification key, then this kind of label just can not get certification, for understanding Certainly this problem, 3. can improve step, and the process of improvement is as follows:
(3-1) the key KEY that read write line self stores being divided into two kinds, a kind of is current key K_new, Another kind be history used key K_old, K_old be an array, it is used that the inside includes that history is adopted All keys or part of key.
(3-2) after receiving the C_T value that label transmits, read write line is first according to K_new, R1 and R2 Obtain the first validation value C`:
C`=[(K_new&R2&R1)2mod M]L
(3-3) judge that C` with C_T is the most equal, if equal, perform step (3-4);Otherwise, perform Step (3-5).
(3-4) make KEY be equal to K_new, perform step 4..
(3-5) the second validation value C`` is obtained according to K_old, R1 and R2:
C``=[(K_old&R2&R1)2mod M]L
Here C`` is an array, if all of value is the most unequal with C_T in this array, then mark is described Label are to forge, and certification terminates at once.If there being C``_i with C_T equal, then make KEY be equal to 4. key K_old_i corresponding for this C``_i, perform step.
The BAN logical form fractional analysis of authentication protocol is given below, is proved by BAN formalization analysis The safety of mutual authentication method and correctness, it was demonstrated that process is as follows: (for the change of word segment above, Have also been made certain change below, please audit, the formula trouble amendment referred here to)
First the idealized model of agreement is given:
Message 1. R → T:Query, A, B
Message 2. T → R:C_T
Message 3. R → T:D
The original hypothesis of agreement be given below:
P1:R believes R and T shared key value KEY.
P2:T-phase letter R and T shared key value KEY_T, KEY with KEY_T is equal.
P3:R believes that R and T shares identifier ID _ L.
P4:It is equal that T-phase letter R and T shares identifier ID _ LT, ID_LT and ID_L.
P5:R believes that R and T shares identifier ID _ R.
P6:It is equal that T-phase letter R and T shares identifier ID _ RT, ID_RT and ID_R.
P7:R | ≡ # (R1), R believe the freshness of random number R 1.
P8:T | ≡ # (R1), the freshness of T-phase letter random number R 1.
P9:R | ≡ # (R2), R believe the freshness of random number R 2.
P10:T | ≡ # (R2), the freshness of T-phase letter random number R 2.
P11:The T-phase letter R jurisdiction to A.
P12:The T-phase letter R jurisdiction to B.
P13:R believes the T jurisdiction to C_T.
P14:The T-phase letter R jurisdiction to D.
Security Target:
G1:T | ≡ A, T-phase letter A.G2:T | ≡ B, T-phase letter B.
G3:R | ≡ C, R believe C_T.G4:T | ≡ D, T-phase letter D.
Analysis ratiocination:
1. obtained by message(T once received message A), and by original hypothesis P1 and message implication method ThenIf (main body P believes shared key K of main body P and Q, and P once received and uses K Ciphertext X of encryption, then P believes message X that main body Q sends over), obtain
By assuming P7, P9 and message freshness ruleIf (part for a message is fresh , the most whole message is also fresh), obtain T | ≡ # (A).By derivedT | ≡ # (A) and with Machine number checking rule| ≡ T | the ≡ A that obtains R.
| ≡ T | ≡ A, initial state assumption P11 and administration rule by RT can be obtained | ≡ A.Therefore, mesh Mark G1 must demonstrate,prove.
Using above-mentioned condition and rule, proving by the same methods obtains G2, G3 and G4.Here is omitted.
Above-described embodiment is the present invention preferably embodiment, but embodiments of the present invention are not by above-mentioned reality Execute the restriction of example, the change made under other any spirit without departing from the present invention and principle, modification, Substitute, combine, simplify, all should be the substitute mode of equivalence, within being included in protection scope of the present invention.

Claims (5)

1. the RFID mutual authentication method meeting backward security, it is characterised in that include step:
(1) unique identifier of the label of read write line reading storage inside, is divided into two parts, is designated as ID_L, ID_R, length is L position;Read write line generates two length and is the random number R 1 and R2 of L position; Read write line utilizes ID_L and R1 to carry out XOR to obtain A, utilize ID_R and R2 to carry out XOR and obtain To B, then A, B and certification request command are sent to label in the lump;
(2), after label receives read write line transmission next A, B and certification request command, self is first taken out ID_LT and ID_RT stored, then carries out XOR by ID_LT and the A received and obtains R1_T, ID_RT and the B received is carried out XOR and obtains R2_T, then according to label self storage close Key KEY_T and calculated R1_T, R2_T set up a label authenticity verification formula, calculate To label authenticity verification value C_T;Finally, C_T value is passed to read write line;
(3) read write line is after receiving the information that label transmission comes, and self is stored by first read write line The random number R 1 and R2 of key KEY and generation substitutes into above-mentioned label authenticity verification formula, is tested Card value C, if C with C_T is unequal, then care label is to forge, and certification terminates at once;If phase Deng, then perform step (4);
(4) random number R 2 of read write line current key KEY and generation is set up a read write line true and false and is tested Card formula, is calculated read write line authenticity verification value D, D value is passed to label;Read write line is according to default Key updating formula more new key;
(5) label is after receiving the D that read write line transmits, the key KEY_T self deposited and meter The R2_T that obtains substitutes into above-mentioned read write line authenticity verification formula, is verified value D_T, if D and D_T is unequal, then explanation read write line is to forge, and certification terminates at once;If equal, then label according to The key updating formula preset updates the key self deposited.
RFID mutual authentication method the most according to claim 1, it is characterised in that described step (2) The computing formula of middle label authenticity verification value C_T is as follows:
C_T=[(KEY_T&R2_T&R1_T)2mod M]L
Wherein, KEY_T represents the key that label self stores, []LTake the front L position of operation result;& represents With computing, M represents modulus, M=2L-1;
In like manner, the computing formula of validation value C is as follows:
C=[(KEY&R2&R1)2mod M]L
RFID mutual authentication method the most according to claim 2, it is characterised in that described step (3) In, the key KEY of read write line self storage is divided into two kinds, and a kind of is current key K_new, another Kind be history used key K_old, K_old be an array;Receiving the C_T value that label transmits After, read write line first obtains the first validation value C` according to K_new, R1 and R2, and is carried out by C` with C_T Relatively,
If the two is equal, then makes KEY be equal to K_new, perform step (4);
If the two is unequal, obtaining the second validation value C`` further according to K_old, R1 and R2, C`` is a number Group, compares value all of in C`` with C_T, if the most unequal, care label is to forge, and recognizes Card terminates at once, if one of them value C``_i in C`` is equal with C_T, then makes KEY be equal to and this Key K_old_i corresponding for C``_i, performs step (4).
RFID mutual authentication method the most according to claim 1, it is characterised in that in step (4) The computing formula of read write line authenticity verification value D is as follows:
D=[KEY2mod M]L& R2;
Wherein, []LTake the front L position of operation result;& represents and computing, and M represents modulus, M=2L-1;
In like manner, the computing formula of validation value D_T is as follows:
D_T=[KEY_T2mod M]L&R2_T。
RFID mutual authentication method the most according to claim 1, it is characterised in that in step (4), The formula of read write line more new key is:
KEY_new=[KEY2mod M]L
Wherein, []LTake the front L position of operation result;M represents modulus, M=2L-1;
In like manner, in step (5), the formula of the key that tag update self is deposited is:
KEY_T_new=[KEY_T2mod M]L
CN201610157282.5A 2016-03-17 2016-03-17 RFID bidirectional authentication method meeting requirement on backward security Pending CN105847009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610157282.5A CN105847009A (en) 2016-03-17 2016-03-17 RFID bidirectional authentication method meeting requirement on backward security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610157282.5A CN105847009A (en) 2016-03-17 2016-03-17 RFID bidirectional authentication method meeting requirement on backward security

Publications (1)

Publication Number Publication Date
CN105847009A true CN105847009A (en) 2016-08-10

Family

ID=56588249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610157282.5A Pending CN105847009A (en) 2016-03-17 2016-03-17 RFID bidirectional authentication method meeting requirement on backward security

Country Status (1)

Country Link
CN (1) CN105847009A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation
CN106792686A (en) * 2016-12-13 2017-05-31 广东工业大学 A kind of RFID mutual authentication methods
CN106936571A (en) * 2017-03-20 2017-07-07 广东工业大学 Synthesize computing using word to realize the method that single label key is wirelessly generated
CN106936591A (en) * 2017-05-10 2017-07-07 广州科技职业技术学院 RFID mutual authentication methods and system
CN107403211A (en) * 2017-08-03 2017-11-28 广东工业大学 A kind of method and system of mobile RFID certification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus
CN103905202A (en) * 2014-03-28 2014-07-02 广东工业大学 RFID lightweight class bidirectional authentication method based on PUF

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马远佳,刘道微: "一种改进的满足后向安全的RFID双向认证协议", 《计算机工程与应用》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation
CN106712927B (en) * 2016-11-30 2020-07-28 广东工业大学 Ultra-lightweight group RFID label ownership transfer method based on word synthesis operation
CN106792686A (en) * 2016-12-13 2017-05-31 广东工业大学 A kind of RFID mutual authentication methods
CN106792686B (en) * 2016-12-13 2020-01-07 广东工业大学 RFID bidirectional authentication method
CN106936571A (en) * 2017-03-20 2017-07-07 广东工业大学 Synthesize computing using word to realize the method that single label key is wirelessly generated
CN106936571B (en) * 2017-03-20 2020-06-02 广东工业大学 Method for realizing wireless generation of single-label secret key by utilizing word synthesis operation
CN106936591A (en) * 2017-05-10 2017-07-07 广州科技职业技术学院 RFID mutual authentication methods and system
CN106936591B (en) * 2017-05-10 2020-07-07 广州科技职业技术学院 RFID bidirectional authentication method and system
CN107403211A (en) * 2017-08-03 2017-11-28 广东工业大学 A kind of method and system of mobile RFID certification

Similar Documents

Publication Publication Date Title
US10305875B1 (en) Hybrid blockchain
CN110046521B (en) Decentralized privacy protection method
CN110059503B (en) Traceable social information anti-leakage method
CN104579694B (en) A kind of identity identifying method and system
CN105959101B (en) A method of RFID two-way authentication is realized using the unclonable technology of physics
CN110191153B (en) Social communication method based on block chain
CN105847009A (en) RFID bidirectional authentication method meeting requirement on backward security
CN110581839B (en) Content protection method and device
CN110121159B (en) Lightweight RFID security authentication method and Internet of vehicles communication system in Internet of vehicles scene
CN115242371B (en) Differential privacy-protected set intersection and base number calculation method, device and system thereof
CN110737915A (en) Anti-quantum-computation anonymous identity recognition method and system based on alliance chain and implicit certificate
CN106027237B (en) Cipher key matrix safety certifying method based on group in a kind of RFID system
CN110769404A (en) Bidirectional authentication method of near field communication technology
Wang et al. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce.
Abyaneh On the privacy of two tag ownership transfer protocols for RFIDs
Eghdamian et al. A secure protocol for ultralightweight radio frequency identification (RFID) tags
CN116633703B (en) Medical sensor monitoring system based on blockchain and RFID protocol
Huang et al. A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs
Liu et al. YPAP: the yoking-proofs based authentication protocol for wearable devices in wireless communications
CN115988493A (en) Mobile radio frequency identification method and device based on bitwise synthesis operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810

RJ01 Rejection of invention patent application after publication