Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm

被引:0
|
作者
Lijun Gao
Lu Zhang
Maode Ma
机构
[1] Shenyang Aerospace University,Department of Computer Science and Technology
[2] Nanyang Technological University,School of Electrical and Electronic Engineering
来源
关键词
RFID; Rabin encryption algorithm; Low-cost; Security authentication protocol;
D O I
暂无
中图分类号
学科分类号
摘要
Research shows that heavy-weighted RFID authentication protocol is weak to adapt to low-cost RFID tags because of the usage of public key Encryption Algorithm. The lightweight authentication protocol is suitable for low-cost RFID security authentication protocol because it adopts only the operation of AND, OR, XOR and shift, etc., but is hard to resist complex attacks. In this article, we use the features of the Rabin public key cryptography algorithm, which verifies that the signature process requires only low-cost square multiplication and modulo operations. Based on this, an RFID security authentication protocol with Rabin encryption algorithm is designed. The protocol improves the security of low-cost RFID tags to the height of the public key cryptosystem, and greatly increasing the security of low-cost RFID.
引用
收藏
页码:683 / 696
页数:13
相关论文
共 50 条
  • [1] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Gao, Lijun
    Zhang, Lu
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 683 - 696
  • [2] XTEA ENCRYPTION BASED NOVEL RFID SECURITY PROTOCOL
    Yu, Jack
    Khan, Gul
    Yuan, Fei
    2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 58 - 62
  • [3] Security analysis of an RFID protocol based on insubvertible encryption
    Wei, Yongzhuang
    Ouyang, Ning
    Ma, Chunbo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
  • [4] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [5] Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
    Kim, Hun-Wook
    Lim, Shu-Yun
    Lee, Hoon-Jae
    2006 International Conference on Hybrid Information Technology, Vol 2, Proceedings, 2006, : 718 - 723
  • [6] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [7] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [8] Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Mellouki, Salah Addine
    Siraj, Zeba
    Zhan, Cheng
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2021, 13 (02) : 1 - 11
  • [9] A kind of RFID Security Protocol Based on the Algorithm of Present
    Gao, Xin
    Lv, Shengqi
    Zhang, Hao
    Li, Xingpeng
    Ji, Weijia
    He, Yang
    Li, Xiaobing
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 50 - 55
  • [10] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530