Font Size: a A A

NTRU Cryptography Based Mutual Authentication Protocol For RFID System

Posted on:2010-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:H S ZhangFull Text:PDF
GTID:2178360275496161Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The RFID system has become one of the most important applications today. However, this technology may suffer from some security threats, such as secrecy, location privacy, forward secrecy, replay attack, etc. A good way to provide security for RFID system is devising authentication protocol, in this paper, the author proposed a new mutual authentication protocol for RFID system. For the sake of introducing the proposed mutual authentication protocol, firstly, the author presented the knowledge about RFID system, the security and privacy of RFID system. Then the author introduced the NTRU algorithm, analyzed the excellence and disadvantage of NTRU algorithm, also the author introduced some improved NTRU algorithm and analyzed the failure of NTRU algorithm's decryption, the analysis indicated that the failure of NTRU algorithm's decryption could be avoided through selected parameters. Finally the author discussed the security of NTRU algorithm, the author thought the NTRU algorithm was security in the RFID system.The NTRU is a more efficiency public key cryptosystem, and it suits for the RFID system, so the author proposed an authentication protocol for the RFID system which has adopted the NTRU public key cryptosystem, and the author discussed the security of this proposed RFID authentication protocol, the study showed that this proposed RFID authentication protocol has more high security and privacy. Then the author discussed the feasibility of proposed RFID authentication protocol, the results showed that the proposed authentication RFID protocol was feasible, the price of this proposed RFID authentication protocol was acceptable. The author had a comparatively analysis for this proposed RFID authentication protocol with four typical RFID authentication protocols, the study showed that the authentication protocol based on public key cryptography has more security than the symmetric encryption based protocol and the hash function based protocol in RFID system. Finally, the authors discussed the security and performance of this protocol, the result showed that this protocol has provided good security for RFID system, and more private for users, the result also shows that the protocol has a nice performance.
Keywords/Search Tags:Authentication protocol, RFID, NTRU, Security, Tag
PDF Full Text Request
Related items