Font Size: a A A

Based On Elliptic Curve Discrete Logarithm Problem In The RFID Authentication Protocol Design And Analysis

Posted on:2012-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:X L ZhangFull Text:PDF
GTID:2178330338984191Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Beacuse of many advantages of RFID is regarded as one of the most promising information technology in the 21st century, thus it become the great demand of economic construction and national defense construction in our country. How to provide security protected mechanism under special conditions of RFID system is related to whether the RFID system is widely used in social life. In the course of the study of the RFID security mechanism, RFID security protocol based on the public key cryptosystem can solve many security problems. Among these cryptosystems, Elliptic curve is more suitable RFID systems since shorter key and higher security level. Although ECDLP-based protocols have been proposed can solve cloning and reply attack, but these protocols don't have a good solution to face privacy problem. This paper gives a detail introduction to the security and privacy problems of the RFID security protocol and proposes the randomize key method to solve the tag tracking attack problems; proposes a new improved protocol by analyzing the typical RFID security protocol such as Schnorr, Okamato and the EC-RAC protocol; analysis the availability of the improved EC-RAC protocol and advise to establish index mechanism to reduce the expending of the background service server in the situation of amount of tags; analysis the security performance of the two new protocol and proves that the new protocol can effectively resist tracking and ensure the privacy security.
Keywords/Search Tags:RFID, Security protocol, ECC, tracking
PDF Full Text Request
Related items