Font Size: a A A

Research On RFID Security Authentication Protocol Based On R-LWE Cryptography

Posted on:2021-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:L F JiaFull Text:PDF
GTID:2428330611470875Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things technology,Radio Frequency Identification(RFID)technology,as the key technology of the Internet of Things perception layer,has a great impact on our daily life and is widely used in all walks of life.However,because RFID system adopts wireless transmission mode,and the tag is limited by computing power and storage capacity,it can not use complex encryption algorithms,so it is vulnerable to various security and privacy threats.Security and privacy issues have become one of the important factors restricting the popularization and application of RFID technology,so effective measures must be taken to ensure the safety of RFID system.Aiming at the security issues of RFID system caused by the rapid development of quantum computers to the existing cryptosystems based on large integer factorization and discrete logarithm problems,This thesis proposes an RFID tripartite mutual authentication protocol based on R-LWE cryptosystem.R-LWE(Ring-Learning With Errors)encryption algorithm has the advantages of resisting quantum attacks,small keys,high efficiency,low ciphertext expansion rate,and can provide theoretical security proof.So it is an ideal choice for resource-constrained devices.In the protocol authentication process,R-LWE encryption algorithm is combined with random numbers to ensure that the information transmitted each time is unpredictable.After the authentication is completed each time,the identification codes of the back-end server and reader are automatically updated,which makes the protocol more secure and can effectively resist various attacks,thus solving the security and privacy problems faced by the RFID system.Then,the security and feasibility of the protocol are analyzed formally by using GNY logic,and the software simulation is performed on the protocol authentication process,which proves that the protocol proposed in this thesis is safe and reliable.Finally,it compares and analyzes several RFID authentication protocols based on NTRU cryptosystem from the aspects of protocol security,calculation amount and storage space,and proves that the protocol proposed in this thesis not only has high security,but also has high calculation,which meets the actual needs of existing low-cost RFID system.
Keywords/Search Tags:RFID, R-LWE, Quantum attack, Protocol authentication, GNY logic
PDF Full Text Request
Related items