Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm

被引:0
|
作者
Lijun Gao
Lu Zhang
Maode Ma
机构
[1] Shenyang Aerospace University,Department of Computer Science and Technology
[2] Nanyang Technological University,School of Electrical and Electronic Engineering
来源
关键词
RFID; Rabin encryption algorithm; Low-cost; Security authentication protocol;
D O I
暂无
中图分类号
学科分类号
摘要
Research shows that heavy-weighted RFID authentication protocol is weak to adapt to low-cost RFID tags because of the usage of public key Encryption Algorithm. The lightweight authentication protocol is suitable for low-cost RFID security authentication protocol because it adopts only the operation of AND, OR, XOR and shift, etc., but is hard to resist complex attacks. In this article, we use the features of the Rabin public key cryptography algorithm, which verifies that the signature process requires only low-cost square multiplication and modulo operations. Based on this, an RFID security authentication protocol with Rabin encryption algorithm is designed. The protocol improves the security of low-cost RFID tags to the height of the public key cryptosystem, and greatly increasing the security of low-cost RFID.
引用
收藏
页码:683 / 696
页数:13
相关论文
共 50 条
  • [41] Low cost minimal mutual authentication protocol for RFID
    Zhang, Xiang
    Baciu, George
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 620 - +
  • [42] A Lightweight Authentication Protocol for Low-Cost RFID
    Hung-Yu Chien
    Chen-Wei Huang
    Journal of Signal Processing Systems, 2010, 59 : 95 - 102
  • [43] A Secure RFID Authentication Protocol with Low Communication Cost
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    Miyaji, Atsuko
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 559 - +
  • [44] Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7292 - 7297
  • [45] Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption
    Hang, Tinghui
    Ding, Yong
    Wang, Zhen
    Wang, Huijiao
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 417 - 423
  • [46] An authenticated encryption based grouping proof protocol for RFID systems
    Rostampour, Samad
    Bagheri, Nasour
    Hosseinzadeh, Mehdi
    Khademzadeh, Ahmad
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5581 - 5590
  • [47] Data Security On RFID Information Using Word Auto Key Encryption Algorithm
    Rahim, Robbi
    Lubis, Syamsuddin
    Nurmalini, N.
    Dafitri, Haida
    1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE, 2019, 1381
  • [48] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [49] Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
    Muhammed, Kamaldeen Jimoh
    Isiaka, Rafiu Mope
    Asaju-Gbolagade, Ayisat Wuraola
    Adewole, Kayode Sakariyah
    Gbolagade, Kazeem Alagbe
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 377 - 390
  • [50] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
    Akgun, Mete
    Caglayan, M. Ufuk
    2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 648 - 653