期刊文献+

RFID系统中基于公钥加密的相互认证协议 被引量:15

Public key based mutual authentication protocol for RFID system
下载PDF
导出
摘要 随着RFID系统能力的提高和标签应用的日益普及,安全问题,特别是用户隐私问题变得日益严重。提出了一种新的RFID认证协议。认为基于公钥加密的RFID认证协议相对基于哈希函数和基于对称密钥加密的RFID认证协议,有较好的安全性。公钥加密算法NTRU被认为是一种效率较高的加密算法,且更适合于RFID系统,因此提出的协议采用了NTRU公钥加密算法。对该协议的安全性和性能进行了比较分析,结果表明该协议可以为RFID系统提供更好的安全性,能为用户提供更好的隐私保护,且性能较佳。 The RFID system has become one of the most important applications.However,this technology may suffer from some security threats,such as secrecy,location privacy,forward secrecy,replay attack,etc.A good way to provide security for RFID system is devising authentication protocol.A new mutual authentication protocol for RFID system is proposed.The authentication protocol based on public key cryptography has more security than the symmetric encryption based protocol and the hash function based protocol in RFID system.The NTRU is a more efficient public key cryptosystem,and it suits for the RFID system,so the proposed authentication protocol has adopted the NTRU public key cryptosystem.Then the security and performance of this protocol are discussed.The result shows that this protocol has provided good security for RFID system,more privacy for users,and has a nice performance.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第5期69-72,共4页 Computer Engineering and Applications
关键词 认证协议 NTRU 安全性 哈希函数 RFID 标签 authentication protocol Number Theory Research Uni(tNTRU) security Hash function Radio Frequency IDentification(RFID) tag
  • 相关文献

参考文献12

  • 1Dimitriou T.A lightweight RFID protocol to protect against traceability and cloning attacks[C] //Secure Comm:Conference on Security and Privacy for Emerging Areas in Communication Networks.Athens,Greece:IEEE Press,2005:59-66.
  • 2Song B,Mitchell C J.RFID authentication protocol for low-cost tags[C] //Proceedings of the 1st ACM Conference on Wireless Network Security,Alexandria,Virginia,USA.ACM Press,2008:140-147.
  • 3Chien Hung-yu,Chen Che-hao.Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254-259.
  • 4Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.Cryptanalysis of a novel authentication protocol conforming to EPCC1G2 standard[J].Computer Standards & Interfaces,2009,31(2):372-380.
  • 5Kang S Y,Lee D G,Lee I Y.A study on secure RFID mutual authentication scheme in pervasive computing environment tJ].Computer Communications,2008,31(18):4248-4254.
  • 6Kaya S V,Sava E.Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks,2009,7(1):136-152.
  • 7Paise R I,Vaudenay S.Mutual authentication in RFID:Security and privacy[C] //Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security 2008,Tokyo,Japan.ACM Press,2008:292-299.
  • 8Eun-Kyung R,Takagi T.A hybrid approach for privacy-preserving RFID tags[J].Wireless Communications.Computer Standards & Interfaces,2009,31(4):812-815.
  • 9Chen Ya-lin,Jue-Sam C,Sun Hung-min.A novel mutual anthentication scheme based on quadratic residues for RFID systems[J].Computer Networks,2008,52(12):2373-2380.
  • 10Gaubatz G,Kaps J P,(O)ztark E,et al.State of the art in ultra-low power public key cryptography for wireless sensor networks[C] //3rd IEEE International Workshop on Pervasive Computing and Communication Security-PerSec 2005,Kauai Island,Hawaii.IEEE Press,2005:146-150.

二级参考文献11

  • 1[1]Hoffstein J,Pipher J,Silverman J H.NTRU:a ring based public key cryptosystem.In Proc.Of ANTS Ⅲ,LNCS,1998,1423:267~288.
  • 2[2]Coppersmith D,Shamir A.Lattice attacks on NTRU.In Advances in Cryptology-EUROCRYPT'97,LNCS,1997,1233:52~61.
  • 3[3]Jaulmes E,Joux A.A chosen ciphertext attack on NTRU.Proc.of Crypto'00,LNCS,2000,1880:20~35.
  • 4[4]Nguyen P Q,Pointcheval D.Analysis and improvements of NTRU encryption paddings.Advances in Cryptology-CRY PTO 2002,LNCS,2002,2442:210~225.
  • 5[5]Proos J.Imperfect decryption and an attack on the NTRU encryption scheme.Cryptology ePrint Archive:Repor 2003 /002.
  • 6[6]Han D,Hong J,Han J,et al.Key recovery attacks on NTRU without ciphertext validation routine.Information Security and Privacy,8th Australasian Conference,ACISP 2003,Wollongong,Australia,LNCS,2003,2727:274~284.
  • 7[7]Dwork C,Naor M,Reingold O.Immunizing encryption schemes from decryption errors.Eurocrypt 2004,LNCS,2004,3027:342~360.
  • 8[8]Graham N H,Nguyen P,Pointcheval D,et al.The impact of decryption failures on the security of NTRU encryption.Crypto 2003,LNCS,2003,2729:226~246.
  • 9[9]Gentry C,Szydlo M.Cryptanalysis of the revised NTRU signature scheme.In Eurocrypt'02,LNCS,2002,2332:299~320.
  • 10[10]Schnorr C P.Lattice reduction by random sampling and birthday methods.STACS 2003:20th Annual Symposiumon Theoretical Aspects of Computer Science.LNCS,2003,2607:146~156.

共引文献2

同被引文献151

引证文献15

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部