Font Size: a A A

A Mobile Rfid Authentication Protocol Based On Single Block Hash Function

Posted on:2016-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2308330470960978Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recent years the reader can be integrated in mobile terminals such as mobile phone, the security of communication between the reader and database does not belong to traditional network security, so it can’t meet the assumption that the communication between the reader and database is safe and it need to design authentication protocols which are suitable for mobile RFID system. RFID authentication protocol mainly has three requirements:security, efficiency and low cost. In order to balance the three requirements, RFID system mainly uses Hash function to encrypt the information. In RFID system, EPC code which is widely used in RFID system is 256 bits, uCode is 128 bits. Because the packet length of MD5 and SHA-1 is 512 bits, it will reduce the efficiency of RFID system. So in order to increase the efficiency of RFID system and reduce the cost of RFID system, it needs to design one kind of Hash functions which is suitable for RFID system.This dissertation mainly completes two designs:new single block Hash function (NSBH) and mobile RFID authentication protocols. The NSBH function improves the previous Hash functions and ensures the security and efficiency. In the stage of information pretreatment, NSBH function uses a random number and extends the information. These two methods eliminate the regularity of the original information and enhance the difficulty of analysis. In the circulation, NSBH function modifies the round function and simplifies the calculation. These methods eliminate the symmetry of the round function and raise the operating efficiency.Mobile RFID protocols include ILAP protocol and ILWAP protocol. ILAP protocol only uses lightweight encryption functions such as Hash function and XOR function to encrypt the information and makes the protocol meet the needs of all aspects. ILWAP protocol uses lightweight encryption functions between the reader and the tag to ensure the low cost of the tag, uses symmetric encryption algorithm between the reader and database to reduce the amount of computation in database.This dissertation uses Java language to implement the NSBH function and compares the NSBH function with previous functions. The experimental result shows that the efficiency of NSBH function is 8.81% higher than MD5, and 1.11% higher than SBH-256. Because the NSBH function uses random number and its logical structure and length of the output are the same as MD5, so it can offer reliable security. This dissertation uses BAN logic to test the security of ILAP protocol and ILWAP protocol, the result shows that ILAP and ILWAP protocols can provide reliable security. Compared with other protocols, ILAP and ILWAP protocols can ensure the security, increase the efficiency and reduce the the cost of RFID system, so these two protocols have the very good practical value.
Keywords/Search Tags:wireless reader, mobile RFID system, RFID protocol, MD5 function, single block Hash function
PDF Full Text Request
Related items