基于伪随机数发生器的双向认证协议  被引量:2

Mutual Authentication Protocol Based on Pseudo Random Number Generator

在线阅读下载全文

作  者:谢海宝 吕磊 XIE Hai-bao;LYU Lei(Information Center,Administration for Market Regulation of Henan Province,Zhengzhou 450008,China;School of Information Science and Engineering,Henan University of Technology,Zhengzhou 450008,China)

机构地区:[1]河南省市场监督管理局信息中心,河南郑州450008 [2]河南工业大学信息科学与工程学院,河南郑州450008

出  处:《计算机技术与发展》2022年第1期128-133,共6页Computer Technology and Development

基  金:国家自然科学基金(61705060)。

摘  要:射频识别系统中电子标签与读写器间基于无线链路交互数据信息,因无线链路自身具有的开放性,使得两者间交互的数据信息易被第三方人员获取,存在一定的安全隐患。为解决该安全问题,文中给出了一种基于伪随机数发生器的认证协议。协议摒弃经典加密算法对信息加密,而是采用伪随机数发生器实现对信息的加密,伪随机数发生器的实现具备时钟周期数少、门电路总数少等优势,能够降低射频识别系统的整体成本;协议为能够有效保持交互数据信息的新鲜性,在数据加密过程中均混入随机数,随机数由随机数产生器产生,具有互异性、不可预测性等优势,在保持信息新鲜性的同时,亦可抵抗第三方人员发起的诸如定位攻击、重放攻击等攻击。将该协议与其他经典协议进行安全及性能对比,表明该协议在可抵抗假冒攻击、异步攻击等常见类型攻击时,还具备较低的成本开销。In RFID system,the interactive data information between the tag and the reader is based on the wireless link.Because of the openness of the wireless link itself,the interactive data information between the tag and the reader is easy to be obtained by the third party.There are some security risks.In order to solve the security problem,an authentication protocol based on pseudo-random number generator is proposed.The protocol abandons the classical encryption algorithm to encrypt the information,but uses the pseudo-random number generator to encrypt the information.The implementation of the pseudo-random number generator has the advantages of less clock cycles and fewer gates,which can reduce the overall cost of the RFID system.In order to effectively maintain the freshness of the interactive data information,the protocol mixes the random number in the data encryption process.The random number is generated by the random number generator,which has the advantages of heterogeneity and unpredictability.While maintaining the freshness of information,it can also resist the attack types such as location attack and replay attack launched by the third party.Compared with other classical protocols in terms of security and performance,it shows that the proposed protocol has lower cost when it can resist common types of attacks such as impersonation attack and asynchronous attack.

关 键 词:物联网 射频识别系统 双向认证 伪随机数发生器 时钟周期数 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象