期刊文献+

基于Niederreiter体制的RFID双向安全认证协议 被引量:1

Mutual authentication security protocol of RFID based on Niederreiter cryptography
在线阅读 下载PDF
导出
摘要 为解决RFID技术在用户隐私方面存在的安全隐患,提出了一种基于Niederreiter密码体制的新型RFID双向安全认证协议。协议建立在大矩阵分解困难性的基础上,与使用对称密码和RSA公钥密码的协议相比安全性能更高、计算复杂度更小、实现效率更高。该协议利用基于嵌入Hash函数的Niederreiter公钥加密方案,通过对比原Hash值与解密后的Hash值是否相等,来实现RFID标签与阅读器之间的安全数据交换。研究结果表明,该协议不仅能有效地保护内容隐私、位置隐私,而且还能防范重放攻击,能够很好地满足RFID系统的安全性要求。 To solve the user privacy security problems of RFID, a new mutual authentication security protocol of RFID based on Niederreiter cryptography is proposed, and the security is based on the difficulty of large matrix decomposition problem. This protocol is superior in security, computational complexity and efficiency compared to those based on RSA and symmetric cryptog- raphy. The protocol proposed uses Niederreiter public key cryptography with Hash function embedded. By comparing the origi- nal Hash value to the Hash value decrypted, the data exchanged between RFID tag and reader can be protected. Research and analysis show that this protocol can effectively defeat content and location privacy attack, as well as relay attack, and can effec- tive protect RFID systems.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第12期4497-4500,共4页 Computer Engineering and Design
关键词 射频识别 公钥密码 Niederreiter体制 安全协议 隐私 radio frequency identification (RFID) public key cryptography Niederreiter scheme security protocol privacy
作者简介 何文才(1956-),男,黑龙江鹤岗人,硕士,教授,硕士生导师,研究方向为信息安全和编码理论; 阎晓姮(1986-),女,辽宁大连人,硕士研究生,研究方向为信息安全; 赵程程(1988-),女,陕西西安人,硕士研究生,研究方向为基于编码的公钥密码体制; 刘培鹤(1972-),男,黑龙江鹤岗人,实验师,研究方向为网络安全; 韩妍妍(1982-),女,黑龙江哈尔滨人,博士,助理研究员,研究方向为信息安全。E-mail:yanxh0714@qq.com
  • 相关文献

参考文献11

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:213
  • 2Weis S,Sarma S, Rivest R,et al. Security and privacy as-pects of low-cost radio frequency identification systems [C].International Conference on Security in Pervasive Computing.Berlin: Springer, 2003 : 454-469.
  • 3Ohkubo M, Suzuki K,Kinoshita S. Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID [C].Sendai : The Symposium on Cryptography and Information Se-curity, 2004: 719-724.
  • 4Henrici D? Muller P. Hash-based enhancement of location privacy forradiofrequaicy identification devices using varying identifiers [C].Orlando? USA: International Workshop on Pervasive Computing andCommunication Security, 2004: 149-153.
  • 5Molnar D, Wagner D. Privacy and security in library RFID:Issues, practices and architectures [ C ]. Washington DC,USA: the 11th ACM Conference on Computer and Communica-tion Security, 2004: 210-219.
  • 6Martin Feldhofer, Sandra Ebminikus, Johannes Wolkerstorfer.Strong autentication for RFID systons using the AES algorithm [C].CHS2004. Berlin: SpringerVering, 2004: 357-370.
  • 7梅挺,代群.基于Niederreiter纠错码的公钥密码体制的研究[J].通信技术,2007,40(6):36-39. 被引量:3
  • 8Chen Yu-yi, Lu Jun-Chao, Chen Shin-I. A low-cost RFID au-thentication protocol with location privacy protection [C]. Xi,an,China : The fifth International Conference on InformationAssurance and Security, 2009 : 109-113.
  • 9Kang Soo-Young, LeeDeok-Gyu,Lee Im-Yeong. A study onsecure RFID mutual authentication scheme in pervasive compu-ting environment [J], Computer Communications, 2008, 31(18): 4248-4254.
  • 10张焕国,管海明,王后珍.抗量子密码体制的研究现状[C].北京:中国密码学会,2011: 1-31.

二级参考文献36

  • 1李元兴,王新梅.关于Niederreiter代数码公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36. 被引量:11
  • 2[1]Niederreiter H.Knapsack-type cryptosystems and algebraic coding theory[J].Problems of Control and Informat.Theory,1986,15:159~166.
  • 3[2]Cover T M Enumerative source encoding[J].IEEE Trans Inforw.Theory,1973,19:73~77.
  • 4[5]Brickell E F.Odlyzko A M.Cryptanalysis:a survey of recent results[J].Proc.IEEE,1988,76:578~593.
  • 5[6]Adds C M.Meijer H.Security-related commelts regarding McEliece's public-key cryptosystem[J].IEEE Trans.Informat.Theory,1989,35:454~455.
  • 6[7]Lee P J,Briekell E F.An observation on the secuirity of McEliece's public-key cryptosystem[C].Advances in cryptology-Eurocrypt'88,Proceedings,Springer-Verlng,1988:275~280.
  • 7[8]Mac Willjams F J,Sloane N J A.The Theory of Error-Correcting Codes[M].[s.l.]:North-Holland Publishing Company,1977.
  • 8Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 9Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 10Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212

共引文献214

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部