Research of RFID certification security protocol based on hash function and DES algorithm

被引:0
|
作者
机构
[1] Jianghan University Physics and Information Engineering Institute, Hubei
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
Hash function; Rabin algorithm; RFID; Security protocol;
D O I
10.4304/jnw.8.10.2368-2375
中图分类号
学科分类号
摘要
RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security problem of RFID. The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system. With the development of computer and Internet is widely used in various industries, interaction of high-speed information transfer process. The problem of information security is concern. The paper produce and use all kinds of algorithms based on hash function firstly. Then as information on a solid safety lock, MD5, SHA-1 file verification, encryption, digital signature, PKI building has security full of all kinds of information. Finally, it can effectively prevent the attack, ensuring the authenticity of the information not to be modified or leaks. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:2368 / 2375
页数:7
相关论文
共 50 条
  • [1] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [2] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [3] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [4] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [5] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73
  • [6] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [7] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [8] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    The Journal of China Universities of Posts and Telecommunications, 2015, (06) : 27 - 35
  • [9] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Bae Woo-Sik
    Wireless Personal Communications, 2014, 79 : 2595 - 2609
  • [10] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361