首页 | 官方网站   微博 | 高级检索  
     

无线射频识别双向认证协议及性能分析
引用本文:王拓,万武南,陈运.无线射频识别双向认证协议及性能分析[J].成都信息工程学院学报,2013(6):590-597.
作者姓名:王拓  万武南  陈运
作者单位:[1]成都信息工程学院网络工程学院,四川成都610225 [2]成都信息工程学院应用密码学研究所,四川成都610225
基金项目:国家自然科学基金资助项目(60873216);四川省教育厅重点资助项目(12ZA223);四川省科技支撑计划重点资助项目(2012GZ0017)感谢成都市调查校院所应用成果转化项目(12DXYB340JH-002);深圳市产学研究合作项目(CXY201106240019A)对本文的资助.
摘    要:针对姚华桢等人提出的射频识别认证协议易遭受读写器ID揭露,中间人攻击和假冒攻击等安全脆弱性,提出一种基于NTRU公钥密码算法的改进双向认证协议,并用GNY逻辑进行了形式化分析.协议不仅具有一次一密的特点,而且在实现双向认证的同时也完成了会话密钥的交换,并将主要的计算放在读写器上,有效降低了服务器的压力;解决了当前协议中存在的位置跟踪,前向安全性等隐私泄漏问题.分析结果表明,该协议不仅能够可抵抗重传,假冒,拒绝服务等多种恶意攻击,而且具有计算复杂度低,通信量小,效率高等特点,适合在低成本标签实现.

关 键 词:计算机应用技术  信息安全  射频识别  认证协议  NTRU算法  GNY逻辑

RFID Mutual Authentication Protocol and Performance Analysis
WANG Tuo,WAN Wu-nan,CHEN Yun.RFID Mutual Authentication Protocol and Performance Analysis[J].Journal of Chengdu University of Information Technology,2013(6):590-597.
Authors:WANG Tuo  WAN Wu-nan  CHEN Yun
Affiliation:1. School of Network Engineering, Chengdu University of Information Technology, Chengdu 610225 ,China 2. Applied Cryptography Institute, Chengdu University of Information Technology, Chengdu 610225, China)
Abstract:As for so many security vulnerabilities, such as readers' ID-disclosure attack, man-in-the-middle attack, spoofing attack in Yao's authentication protocol, we propose a Radio Frequency Identification mutual authentication protocol based on NTRU public key encryption system, and perform formal analysis with GNY logic. The protocol not only has character of once a secret, but also the session key exchanged when mutual authentication protocol com- pleted. Main computing tasks is implemented on the readers, so the pressure of server can be reduced effectively, the position tracking and forward security issues exist in current protocols can be solved as well. Analytic result shows that the proposed mutual authentication protocol can resist replay attack, counterfeit attack, denial of service attacks and other malicious attacks, and has features of low computational complexity, little communication, high efficiency. It is suitable for apply this protocol in low-cost tags.
Keywords:technology of computer application  information security  radio frequency identification  authentication protocol  number theory research unit algorithm  GNY logic
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号