浏览全部资源
扫码关注微信
[ "章武媚(1971-),女,浙江同济科技职业学院副教授,主要研究方向为网络安全、信息安全等。" ]
网络出版日期:2016-05,
纸质出版日期:2016-05-20
移动端阅览
章武媚. 基于Montgomery型椭圆曲线密码的RFID安全认证方案[J]. 电信科学, 2016,32(5):121-126.
Wumei ZHANG. RFID security authentication scheme based on Montgomery-form elliptic curve cryptography[J]. Observation and communication, 2016, 32(5): 121-126.
章武媚. 基于Montgomery型椭圆曲线密码的RFID安全认证方案[J]. 电信科学, 2016,32(5):121-126. DOI: 10.11959/j.issn.1000-0801.2016107.
Wumei ZHANG. RFID security authentication scheme based on Montgomery-form elliptic curve cryptography[J]. Observation and communication, 2016, 32(5): 121-126. DOI: 10.11959/j.issn.1000-0801.2016107.
针对现有基于椭圆曲线密码(elliptic curve cryptography
ECC)体制的 RFID(radio frequency identification device)安全认证方案不能满足相互认证、隐私保护和前向安全性等要求,提出一种基于Montgomery型椭圆曲线密码的认证方案。利用Montgomery型椭圆曲线来降低计算量,并提供标签和服务器之间的相互认证,具有匿名性和前向安全性。通过分析表明,该方案能够抵抗重放攻击、标签伪装攻击、服务器欺骗攻击、DoS攻击、位置跟踪攻击和克隆攻击。与现有方案相比,该方案在保证较低的内存、计算和通信需求的情况下,提供了较高的安全性能,能够满足RFID系统的安全性要求。
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication
privacy protection and forward security
a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation
and to provide mutual authentication between the label and the server
and anonymity and forward security.The analysis showed that the scheme could resist replay attack
tag camouflage attack
server cheat attack
DoS attack
position tracking attack and clone attack.Compared with the existing schemes
the proposed scheme provides high security performance under low memory
computation and communication requirements
and it can meet the security requirements of the RFID system.
张学军 , 陈彦君 , 常昆 . 改进型RFID相互认证协议研究 [J ] . 计算机技术与发展 2013 , 23 ( 8 ): 129 - 132 .
ZHANG X J , CHEN Y J , CHANG K . An improved RFID mutual authentication protocol [J ] . Computer Technology and Development , 2013 23 ( 8 ): 129 - 132 .
张兵 , 马新新 , 秦志光 . 轻量级RFID双向认证协议设计与分析 [J ] . 电子科技大学学报 2013 , 42 ( 3 ): 425 - 430 .
ZHANG B , MA X X , QIN Z G . Design and analysis of a lightweight mutual authentication protocol for RFID [J ] . Design and analysis of a lightweight mutual authentication protocol for RFID , 2013 42 ( 3 ): 425 - 430 .
张文芳 , 王小敏 , 郭伟 等 . 基于椭圆曲线密码体制的高效虚拟企业跨域认证方案 [J ] . 电子学报 2014 , 42 ( 6 ): 1095 - 1102 .
ZHANG W F , WANG X M , GUO W et al . An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem [J ] . Acta Electronica Sinica , 2014 42 ( 6 ): 1095 - 1102 .
王明辉 , 王建东 . 高效的RFID双向认证协议 [J ] . 计算机应用 2011 , 31 ( 10 ): 2694 - 2696 .
WANG M H , WANG J D . Efficient RFID mutual authentication protocol [J ] . Journal of Computer Applications , 2011 , 31 ( 10 ): 2694 - 2696 .
ARBIT A , OREN Y , WOOL A . Toward practical public key anti-counterfeiting for low-cost EPC tags [C ] // 2011 IEEE International Conference on RFID , April 12 - 14 , 2011 , Orlando,FL,USA . New Jersey : IEEE Press , 2011 : 184 - 191 .
GODOR G , IMRE S . Elliptic curve cryptography based authentication protocol for low-cost RFID tags [C ] // 2011 IEEE International Conference on RFID-Technologies and Applications(RFID-TA) , Sept 15 - 16 , 2011 , Sitges,Spain . New Jersey : IEEE Press , 2011 : 386 - 393 .
CHEN Z , LI L , WU Y , et al . A mutual authentication improvement for traditional unidirectional ECDLP-based RFID authentication protocols [C ] // 2012 Second International Conference on Electric Information and Control Engineering-Volume 02 , 2012 , LA,CA,USA . Washington:IEEE Computer Society , 2012 : 421 - 432 .
FARASH M S . Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography [J ] . Journal of Supercomputing , 2014 , 70 ( 2 ): 987 - 1001 .
吴焘 , 李树国 , 刘理天 . 一种新的余数系统下快速计算素域椭圆曲线点乘的方法 [J ] . 计算机工程与科学 2014 , 36 ( 10 ): 1839 - 1845 .
WU T , LI S G , LIU L T . A new RNS approach for fast Fp elliptic curve point multiplication [J ] . Computer Engineering and Science , 2014 36 ( 10 ): 1839 - 1845 .
庞世春 , 刘淑芬 , 从福仲 等 . 一种Montgomery型椭圆曲线的高效标量乘算法 [J ] . 电子学报 2011 , 39 ( 4 ): 865 - 868 .
PANG S C , LIU S F , CONG F Z et al . An efficient scalar multiplication algorithm on Montgomery-form elliptic curve [J ] . ACTA Electronica Sinica , 2011 39 ( 4 ): 865 - 868 .
ALKHATIB M , JAAFAR A , MRM S , et al . Parallelizing GF(p) Montgomery elliptic curve crypto-system operations to improve security and performance [J ] . Advanced Materials Research , 2012 , 36 ( 7 ): 1906 - 1911 .
杨玉龙 , 彭长根 , 周洲 等 . 基于 Edwards曲线的移动RFID安全认证协议 [J ] . 通信学报 2014 , 35 ( 11 ): 133 - 138 .
YANG Y L , PENG C G , ZHOU Z et al . Edwards curves based security authentication protocol for mobile RFID systems [J ] . Journal on Communications , 2014 35 ( 11 ): 133 - 138 .
HUO L , JIANG Y L , HU L Q . Research on hash-based low-cost RFID security authentication protocol . Advanced Materials Research , 2013 , 46 ( 2 ): 1524 - 1530 .
LIU Z , LIU D , ZOU X , et al . Design of an elliptic curve cryptography processor for RFID tag chips [J ] . Sensors , 2014 , 14 ( 10 ): 883 - 904 .
王潮 , 时向勇 , 牛志华 . 基于Montgomery曲线改进ECDSA算法的研究 [J ] . 通信学报 2010 , 31 ( 1 ): 9 - 13 .
WANG C , SHI X Y , NIU Z H . The research of the promotion for ECDSA algorithm based on Montgomery-form ECC [J ] . Journal on Communications , 2010 31 ( 1 ): 9 - 13 .
0
浏览量
412
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构