Font Size: a A A

Mutual Authentication Protocol Of RFID Based On Elliptic Curve Cryptography

Posted on:2016-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:W HuFull Text:PDF
GTID:2348330488982023Subject:Engineering
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification, RFID) with automatic object identification technology, a quick scan, long distance identify, high security and strong environmental adaptability and other characteristics, is widely used in transportation, health care,identification, logistics and food traceability and other major areas, has become an important part in our daily life. At the same time, the existence of its own security risks has become even more prominent. So to design a safe and efficient authentication is necessary.RFID system achieves the mutual authentication through communication between reader(Reader) and the tag(Tag), since the communication between the reader and the tag is carried out in a radio channel, in such a completely open network allows an attacker to have the opportunity to interact with information eavesdropping, tampering and interception attacks,preventing normal verify each other's true identity between the reader and the tag, and thus undermine the normal operation of the system, steal user of tag privacy information to obtain illegal benefits purposes.Firstly, this paper based on hash function, shared key and symmetric key of authentication protocol is introduced and analysis, and pointed out the non-public-key cryptography algorithm shortcomings in security. Thus raises based on elliptic curve cryptography(ECC) of RFID authentication protocol. By Schnorr, Okamato and EC-RAC representative of these security protocols based on elliptic curve discrete logarithm problem(ECDLP) of RFID protocol analysis and summary of the proposed new ECC-based RFID mutual authentication protocol,by using random number generator, hash and XOR operations and other ways to communicate information between the reader and the tag is encrypted. By combining the Diffie-Hellman key exchange protocol proposed a new ECC-based RFID mutual authentication protocol.Namely the use of ECC technology as the basis for key exchange, ensure the safety of interactive information. And each certification project, the interactive informations of reader and tag are changing, making it difficult for attackers to lock the position of the label, and random number will be updated after each round of authentication, to ensure the safety of thenext session. Finally By analyzing its security, the results show that the new protocol has a good forward security, and can resist the tracking attack, replay attacks, man-in-the-middle attacks, labels disguised attack, denial of service attacks and other common attacks, also can achieve mutual authentication between in the reader and tag, It ensures the safety of the user's privacy, meet the basic requirements of RFID system.
Keywords/Search Tags:RFID, Security protocol, Elliptic curve cryptography, The key, Mutual authentication
PDF Full Text Request
Related items