信息网络安全 ›› 2018, Vol. 18 ›› Issue (10): 51-61.doi: 10.3969/j.issn.1671-1122.2018.10.008

• 技术研究 • 上一篇    下一篇

基于椭圆曲线密码的RFID系统安全认证协议研究

张小红(), 郭焰辉   

  1. 江西理工大学信息工程学院 ,江西赣州 341000
  • 收稿日期:2018-08-30 出版日期:2018-10-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:张小红(1966—),女,河北,教授,博士,主要研究方向为非线性动力学、视频保密通信;郭焰辉(1993—),男,福建,硕士研究生,主要研究方向为密码学、物联网技术。

  • 基金资助:
    国家自然科学基金[61763017];江西省自然科学基金[20161BAB202053,20161BAB206145];江西省研究生创新专项资金[YC2016-S318]

Research on RFID System Security Authentication Protocol Based on Elliptic Curve Cryptography

Xiaohong ZHANG(), Yanhui GUO   

  1. School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou Jiangxi 341000,China
  • Received:2018-08-30 Online:2018-10-10 Published:2020-05-11

摘要:

随着RFID技术在军事、金融、公共安全等领域的广泛应用,人们对RFID系统的安全性提出更高的要求。文章利用椭圆曲线密码(ECC)密钥短、安全性高且存储空间小的特点,设计了一种基于ECC的RFID系统双向认证协议,并用BAN逻辑形式化分析和证明了该协议能够达到预期的安全目标。与其他同类应用协议相比,该协议在抵抗跟踪攻击、拒绝服务攻击、重传攻击以及假冒攻击等方面均有较好的可信度,且能满足双向认证性、机密性、匿名性和前向安全性。该协议所需椭圆曲线点乘运算次数为3次,相比其他协议可减少60%的标签计算开销,RFID系统的执行效率可提高70%,可适用于军事物流管理及涉密文件保密等关键领域。

关键词: 椭圆曲线密码, RFID, 认证协议, BAN逻辑

Abstract:

With the widespread application of RFID technology in military, financial, public security and other fields, people put forward higher requirements for the security performance of RFID system. This paper designs a RFID system mutual authentication protocol based on the elliptic curve cryptography (ECC) by using ECC characteristics of short key, high security and small storage space, and analyzes and proves formally that the protocol can achieve the desired security targets by using BAN logic. Compared with other similar application protocols, the protocol has good reliability in resisting tracking attack, denial of service attack, retransmission attack and impersonation attack, and can satisfy mutual authentication, confidentiality, anonymity and forward security. The protocol requires for 3 times elliptic curve scalar multiplication operations, which reduces the tag computational cost by 60% compared with other protocols, while improves the implementation efficiency of the RFID system by 70%. The protocol applies to the key areas such as military logistics management and confidential documents protection.

Key words: elliptic curve cryptography, RFID, authentication protocol, BAN logic

中图分类号: