Font Size: a A A

Rfid Security Protocols And Encryption Algorithms

Posted on:2011-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:X ChenFull Text:PDF
GTID:2208360308466189Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a new kind of automatic identification technology. In recent years its unique technical advantages has taken many people's attention, and be considered to be the future of industry stars. However, in order to let the society and consumers accept this new technology RFID security protection is necessary. It likes a door guard against attack, provide the security to the operation of the system, and protect the integrity of information.This paper analyzed of the current situation of RFID security protocol at home and abroad. Recounted that a completed RFID security protocol should has authentication, secrecy and integrity, and has the ability to resist various attacks. And compared the existing RFID security protocols'factor, such as anti-attack capability, storage capacity and communication times.Combined with The idea of multi-key encryption algorithm and the RSA propose bring forward a new multi-key encryption algorithm, and then imitate the process of encryption and decryption in C language. Basis on the analyzing of RFID access control system, applied the multi-key encryption algorithm in RFID security protocol. Realize the forward security and unpredictability, have the ability to stand against repeat transmission attack, copy/ counterfeit attack, information tamper attack and inserted attack. At the end, analysed the ability of resistance to attack, and have GNY logic analysis.Proceed from actual conditions of supermarket the paper also proposed a alterable RFID security protocol base on key matrix. This security protocol used three different protocols to meet the various security requirements in three different phases of applications. The outcome of the GNY logic analysis and anti-attack analysis results show that the security protocol does have the ability to resist the attacker's attack on the system.
Keywords/Search Tags:RFID, Security Protocol, Encrypt Algorithm, GNY logic
PDF Full Text Request
Related items