Font Size: a A A

Design And Implementation Of A Sercurity Authentication Protocal Based On GB/T29768-2013

Posted on:2016-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:K F LvFull Text:PDF
GTID:2308330473456012Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Recently, RFID technology is widely applied in more and more fields, such as credit cards, mobile payments. With the fast development of RFID technology, a higher level of security is required, especially in finance and personal information application. In 2014, China National Standardization Management Committee issued a RFID standard "GB/T29768-2013" which requested authentication in RFID for the first time.Firstly, this thesis gives a brief introduction of the principle of RFID system and its application environment. According to the principle of RFID system, this thesis analyzes the security threats faced by RFID system. Thesis discussed the security requirements of RFID system, including data confidentiality, integrity, authenticity and privacy. Then, thesis analyzes several security solutions in current RFID system, pointing out the pros and cons of these security solutions. Thesis designed the secure authentication protocol and key distribution scheme based on GB/T29768-2013 standard, and the authentication protocol was proved by BAN logic. BAN logic proves that the design of secure authentication protocol and key distribution scheme corresponds with the expected goals.Secondly, thesis implemented the security authentication protocol and key distribution scheme of GB/T29768-2013 by software. Two independent programs are used to simulate the process of the authentication between a reader and a tag. The result verified the secure authentication protocol and key distribution scheme.Finally, thesis transplanted the software implementation to the platform of Cortex-M3 and MSP430. On this platform, secure authentication protocol has been tested, and the test result proved the correctness and feasibility of the secure authentication protocol.
Keywords/Search Tags:RFID, sucure protocol, identity authentication
PDF Full Text Request
Related items