Font Size: a A A

RFID Tripartite Security Protocol Based On NTRU Cryptosystem

Posted on:2016-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:Q DengFull Text:PDF
GTID:2308330479955414Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development and application of the Internet of things and the big data, the RFID system is used more and more widely. However, the security issue turns to gradually serious during the transmission of the wireless data. Besides, the limitation of the tagged resources has prevented its development. Especially for recent years, because of the rapid develop of the mobile Internet, the booming mobile RFID system researches requires a higher security and tagged resource cost.Therefore, there is an urging demand for an authentication protocol for the mobile RFID that requires a higher security, a lower cost for the tagged resources.Mobile RFID system’s security and the label cost is mainly embodied in the selection of cryptosystem and the design of the authentication protocol.Based on the comprehensive study the composition of RFID system and safety of the related theories and solutions, this paper analyzes the current agreement to use the password system, using an NTRU optimization algorithm, analyzing its security and comparing its simulation. The result shows :The safety of the optimization algorithm is reliable and compared to the original algorithm of key generation and decryption execution time, its increases nearly 45% and 50%; At the same time, it analyzes the design of authentication protocol, puts forward a tripartite mutual authentication protocol based on NTRU cryptosystem RFID. The agreement firstly uses NTRU cryptosystem,exclusive or operation, cut through calculate and id code update server, the combination of mutual authentication between reader and tags;Then it analyzes its security and feasibility and by establishing the idealized model, using the GYN logic formal analysis was carried out on the deal, theoretically prove protocol security, but also of the agreement by MATLAB simulation, the safety and feasibility of further evidence that the agreement;Finally, it compares the security and performance withother related authentication protocols, the results shows that: this agreement can provide higher security in mobile RFID system and the label resource requirements are relatively low, which is suitable for low-cost RFID tags. At the end of this Paper, it summarizes the content of the research, expounds the main work, points out the existing problems, and the research of the next step for the future.
Keywords/Search Tags:Mobile RFID, GYN Logic, Security, Tripartite Authentication Protocol, NTRU Key Cryptogrphy
PDF Full Text Request
Related items