期刊文献+

基于椭圆曲线密码的RFID安全协议 被引量:10

Security protocol of RFID based on elliptic curve cryptography
在线阅读 下载PDF
导出
摘要 为了能够解决RFID在用户安全、隐私等问题方面的安全隐患,提出了一种基于椭圆曲线密码的RFID安全协议。在椭圆曲线离散对数问题难解的基础上,与其它公钥密码体制相比,该协议的安全性能更高、密码长度更短且计算量更低。该协议运用基于椭圆曲线的DH密钥交换协议ECDH(ellipticcurveDiffie-Hellman)与基于嵌入明文的加密方案,实现了保护RFID标签与读写器之间的数据交换;同时,通过对该协议的安全性分析以及与其它采用对称密钥体系的RFID协议的比较表明,该协议能够满足RFID系统的安全性要求。 To solve the problems of consumers’security and privacy,a new security protocol of RFID based on elliptic curve cryptography(ECC) is proposed,and the security of ECC is based on the difficulty of elliptic curve discrete logarithm problem(ECDLP).Comparing with other asymmetric cryptography,ECC has stronger security,shorter key length,less computation and so on.This protocol uses the elliptic curve Diffie-Hellman(ECDH) and the algorithm of plaintext embedding in elliptic curve,so the data exchanged between RFID tag and reader can be protected by this protocol.By analyzing its security and efficiency,comparison with these protocols based on symmetric cryptography,our protocol can meet the security requirements of RFID systems very well.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第24期5165-5167,5182,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60903187) 上海市重点学科建设基金项目(J50103) 上海市教委创新基金项目(10YZ13)
关键词 椭圆曲线密码 RFID 隐私 轻量 安全协议 elliptic curve cryptography RFID privacy lightweight security protocol
  • 相关文献

参考文献8

  • 1Weis S,Sarma S,Rivest R,et aI.Security and privacy aspects of low-cost radio frequency identification systems[C]International Conference on Security in Pervasive Computing.Berlin:Springer,2003:454-469.
  • 2Ohkubo M,Suzuki K,Kinoshita S.Efficient hash-chain based RFID privacy protection scheme[C].Proc Internet Conference Ubiquitous Computing,2004.
  • 3Henrici D,Muller P.Hash-based enhancement of location privacy for radiofrequancy identification devices using varying identifiers[C].Orlando,USA:International Workshop on Pervasive Computing and Communication Security,2004:149-153.
  • 4Molnar D,Wagner D.Privacy and security in library RFID:Issues,practices,and architectures[C].Washington,DC,USA:Proceedings of the 11th ACM Conference on Computer and Communications Security,2004:210-219.
  • 5Martin Feldhofer,Sandra Dominikus,Johannes Wolkerstorfer.Strong autentication for RFID systems using the AES algorithm[C].CHS 2004.Berlin:Springer-Vering,2004:357-370.
  • 6Lee S,Asano T,Kim K.RFID mutual authentication scheme based on synchronized secret information[C].Hiroshima,Japan:Symposium on Cryptography and Information Security,2006.
  • 7Chien H Y,Chen C H.Mutual authentication protocol for RFID conforming to EPC class-1 generation 2 standards[C].Computer standards and Interfaces,2007,29(2):254-259.
  • 8Chien H Y.SASI:A new ultra-lightweight RFID anthentication protocol providing strong authentication and strong integrity[C].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.

同被引文献67

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:214
  • 3刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 4杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 5周开利,梁仁军,王旭.最优分组索引的RFID安全协议[J].科研发展,2011:81-82.
  • 6Ferraiolo D,Kuhn R. Role based access controls[C]//Proc of the 15th NIST NCSC National Computer Security Confer- ence, 1992:554-563.
  • 7Sarma S E, Weis S A, Engels D W. RFID systems and secu- rity and privacy implications[C]//Proc of the 4th Interna tional Workshop on Cryptographic Hardware and Embedded Systems(CHE2002), 2003:454 -469.
  • 8Weis S A. Security and privacy in radio frequency identifica- tion device[D]. USA: MIT, 2003.
  • 9Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based for ward-secure privacy protection scheme for low-cost RFID[C] //Proc of the 2004 Symposium on Cryptography and Infor- mation Security(SCIS 2004), 2004 : 719- 742.
  • 10Wang Gui-chao, Zhang Ai-li, Li Yong-zhen. Secure authen tication protocol of RFID system based on access control[J]. Advanced Engineering Forum, 2012,6(9) : 1072-1077.

引证文献10

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部