期刊文献+

基于NTRU密码体制的RFID认证协议的研究 被引量:4

RFID Authentication Protocol Based on NTRU Cryptosystem
下载PDF
导出
摘要 对目前基于NTRU的RFID认证协议进行了安全性、效率及成本分析,提出一种基于NTRU密码体制的RFID双向认证协议。其首先将基于SVP问题的密码体制、截联及相关数据相结合从而实现阅读器与标签的双向认证,然后分析了它的安全性及计算性能并采用BAN对其安全性进行了证明,最后将相关协议进行比较分析,结果表明本协议具有更高的安全性与效率以及更低的成本。 This paper conducted analysis on the security, efficiency and cost of RFID authentication protocol based on NTRU, and came up with a two-way RFID authentication protocol on the basis of NTRU cryptosystem. Firstly, based on the combination of cryptosystem, cut and connection, as well as related data of SVP, it a- chieved a two-way authentication between the reader and tab. Then, it further analyzed its security and computa- bility and was able to make use of BAN to testify its security. Finally, after the comparison and analysis of the connected protocols, it gave the final result that this protocol obtains higher security and efficiency, but with low- er cost.
作者 邓强 杨世平
出处 《贵州大学学报(自然科学版)》 2015年第1期65-68,80,共5页 Journal of Guizhou University:Natural Sciences
基金 国家自然科学基金项目([2011]61163049号)
关键词 NTRU密码体制 RFID认证协议 安全性 NTRU cryptosystem RFID authentication protocol security
  • 相关文献

参考文献8

  • 1Gauhatz G, Kaps J P. Sate of the art in ultra-low power public key cryptography for wireless sensor networks [ C ]//Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security-PerSec 2005. Washington DC, USA : IEEE Press ,2005 : 146 - 150.
  • 2Robin D, Saravanan S, Wanlei Z. A practical quadratic residues based scheme forauthentication and privacy in mobile RFID sys- tems[ J]. Ad Hoc Networks,2013,11 ( 1 ) :383 - 396.
  • 3陈剑,张春,陈虹.低功耗RFID的公钥密码系统的RFID通信安全协议的研究[J].中上大学学报:自然科学版,2009,48(5):6-11.
  • 4姚华桢,刘传菊,李小敏.基于AES与NTRU的RFID安全认证协议[J].计算机工程与应用,2012,48(35):80-84. 被引量:13
  • 5何文才,阎晓姮,于源猛,刘培鹤,韩妍妍,赵程程.基于NTRU密码体制的RFID安全协议[J].计算机工程,2014,40(7):114-117. 被引量:7
  • 6冯军,潘郁.基于共享密钥的RFID认证协议[J].自动化仪表,2012,33(6):49-52. 被引量:2
  • 7夏永祥,史志才,张瑜,戴建.一种基于轻权加密体制的RFID认证协议[J].计算机工程,2014,40(7):69-72. 被引量:4
  • 8Gildas A, Cedric L, Tania M. When Compromised Readers Meet RFID[ C ]//10th International Workshop, WISA 2009, Busan, Korea, August25 - 27,2009. Berlin Heidelberg: Springer, 2009, 5932 : 35 - 50.

二级参考文献48

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2卓泽朋,魏仕民.NTRU公钥密码体制及安全性分析[J].淮阴工学院学报,2006,15(5):65-67. 被引量:4
  • 3Liu A X, Bailey L A. PAP:a privacy and authentication protocol for passive RFID tags [ J 1. Computer Communications, 2009,32 ( 7 - 10) :1194 - 1199.
  • 4Sarma S E, Weis S A, Engels D W. Radio-frequency-identification secure risks and challenges [ J ]. Cryptophytes ,2003,6 ( 1 ) :2 - 9.
  • 5Lee S M, I-Iwang Y J, Lee D H, et al. Efficient authentication for low- cost RFID systems [ C ]//International Conference on Computational Science and Its Applications ,2005 ( 3080 ) : 195 - 209.
  • 6Sauna S E, Weis S A, Engels D W. RFID systems and security and privacy implications[ C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems,2003(2523) :1 - 19.
  • 7Weis S A,Sarma S E,Rivest RL,et al. Security and privacy aspects of low-cost radio frequency identification systems [ C ]//Proceedings of the 1st International Conference on Security in Pervasive Computing,2004(2802) :50-59.
  • 8Chien H Y. SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [ J ]. IEEE Transactions on Dependable and Secure Computing,2007,4 (4) :337 -340.
  • 9Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID [ C ]// Proceedings of the 2004 Symposium, Cryptography and Information Security,2004 : 719 -724.
  • 10Eliane J, Antoine J. A chosen-ciphertext attack against NTRU [ C ]// Advances in Cryptology-CRYPTO 2000 Lecture Notes in Computer Science,2000(1880) :20 -35.

共引文献18

同被引文献33

  • 1王庆旺,杨华.13.56MHz RFID读卡器直接匹配天线的对称设计方法研究[J].射频世界,2009(6):18-20. 被引量:3
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3郁滨,蔡振国,陈韬.参数可选的椭圆曲线加密算法的整体设计[J].计算机应用研究,2007,24(6):145-146. 被引量:3
  • 4丁汉吉,何蕾,阮树骅.AES算法研究及实现分析[J].网络安全技术与应用,2007(11):80-81. 被引量:15
  • 5Michael Burrows,Martin Abadi,Roger Needham.A logic of authentication[J]. ACM Transactions on Computer Systems (TOCS) . 1990 (1)
  • 6Bogdanov A,,Knudsen L R,Leander G et al.PRESENT:An ultra-lightweight block cipher. Lecture Notes in Computer Science . 2007
  • 7RHEE K,KWAK J,KIM S,et al.Challenge-response based RFID authentication protocol for distributed database environment. Proceedings of the 2nd International Conference on Security in Pervasive Computing . 2005
  • 8MIYAKO O,KOUTAROU S,SHINGO K.Hash-chainbased forwardsecure privacy protection scheme for low-cost RFID. Proceedings of the 2004 Symposium on Cryp-tograph And Information Security (SCIS2004) . 2004
  • 9LEE S M,HWANG Y J,LEE D H,et al.Efficient authentication for low-cost RFID systems. Proceedings of International Conference on Com-putational Science and Its Applications . 2005
  • 10PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,et al.LMAP:a real lightweight mutual authentication protocol forlow-cost RFID tags. Proc Second Workshop on RFID Se-curity . 2006

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部