Font Size: a A A

RFID Encryption Algorithm And Security Authentication Protocol Based On Super Prime Number And Chaos

Posted on:2019-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:G D ZhuFull Text:PDF
GTID:2428330548957477Subject:Electrical theory and new technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)is a non-contact automatic identification technology.It transmits non-contact information through spatial coupling of RF signals,and further achieves the purpose of identification.Currently,RFID is applied more and more widely and seen to satisfy the different needs of a vast number of users from all circles of life.However,it faces the problems of disclosing different levels of security and privacy.A variety of security risks exist in every segment of RFID system,such as electronic tags,reader-writers and background servers.The problem of security and privacy has become one of the main factors that restrict the extensive application of RFID technology.In order to prevent unauthorized access to RFID system,or prevent stealing or even malevolent tampering of electronic tag information,measures must be taken to ensure the effectiveness and privacy of RFID data,so s to ensure data security.Wherein,a commonly used measure is to build a security model integrated with encryption algorithm and security authentication technology.There are inherent and structural similarities between chaos and cryptography.The encryption algorithm based on chaos theory has the advantages of simple calculation,high efficiency and convenient implementation.It inspires people to apply chaos to protect information security of low-cost RFID system.A typical example is the chaotic encryption algorithm based on one dimension Logistic mapping.Considering finite precision effect may degenerate the sequence of chaotic key stream into a short-cycle cyclic sequence,and further result in the dynamic degradation of one-dimensional Logistic map chaotic encryption algorithm,it introduces long period algorithm of super prime numbers,combines the initial sensitivity of chaos,and puts forward an encryption algorithm that can effectively overcome the degradation of dynamic characteristics of chaotic systems.Consequently,the combination of super prime numbers and chaos theory prolongs the periodic length of pseudorandom sequence.Meanwhile,test simulation and correlation analysis have showed that the cryptographic sequence generated by the algorithm has good ergodicity,randomness and initial value sensitivity,meets the security requirements of low-cost RFID system,and has the advantages of fast encryption,easy realization and low resource cost.At present,there is no unified security authentication protocol for RFID system.After the explanation of the needs for design of RFID authentication protocol,we provide a systematic proposal based on chaotic encryption algorithm,and a suitable RFID security authentication mechanism is designed based on this algorithm.In addition,it has been proved through BAN logic that this authentication protocol is able to effectively resist various types of attacks,such as replay,theft and location tracking,and the security of the system is improved consequently.
Keywords/Search Tags:RFID, Chaos, Logistic Mapping, Super Prime Number, Authentication Protocol
PDF Full Text Request
Related items