Font Size: a A A

Design And Analysis Of Cryptographic Protocols For RFID

Posted on:2009-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y L PeiFull Text:PDF
GTID:2178360245971661Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification (RFID) technology is an untouched auto-identification technology which had been raised in 80's last century. Now RFID technology is used in a lot of facets of industry manufacture and everyday life, but there is a hidden trouble which can't be ignored in RFID system, it is lack of security mechanism, so RFID is not able to protect its date effectively. Currently security of RFID has been an important factor which restricts RFID used on a large scale.This article describes structure and principle of the RFID system, the existence of the system security and privacy issues are elaborated in detail and this artical gives RFID systems security needs as well as on the existing radio frequency system for the safety assessment of the agreement, pointing out its deficiencies. On this basis, Key Matrix-based Cryptographic Protocol for RFID and Random Hash-Chain Cryptographic Protocol for RFID are proposed. Key Matrix-based Cryptographic Protocol for RFID, enhancing the efficiency of the implementation of cryptographic protocols as the starting point, encrypts the data transported between tags and readers by key matrix and renews the tag's secret value after each authentication; the protocol efficiently prevents multiple attacks. Analysis shows that this protocol is high efficiency, low-cost and good security. Random Hash-Chain Cryptographic Protocol for RFID is an improvement to the original Hash-Chain cryptographic protocols, it overcomes the vulnerability to re-attack of the original protocol, protecting the communication between RFID tags and readers.Finally, the security and performance of the two protocols are analysed, and compared with the exiting cryptographic protocols. Finally, on the basis of the above, this paper gives a contribution and the further research.
Keywords/Search Tags:RFID system, cryptographic protocol, Hash-Chain, key matrix
PDF Full Text Request
Related items