Research of RFID certification security protocol based on hash function and DES algorithm

被引:0
|
作者
机构
[1] Jianghan University Physics and Information Engineering Institute, Hubei
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
Hash function; Rabin algorithm; RFID; Security protocol;
D O I
10.4304/jnw.8.10.2368-2375
中图分类号
学科分类号
摘要
RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security problem of RFID. The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system. With the development of computer and Internet is widely used in various industries, interaction of high-speed information transfer process. The problem of information security is concern. The paper produce and use all kinds of algorithms based on hash function firstly. Then as information on a solid safety lock, MD5, SHA-1 file verification, encryption, digital signature, PKI building has security full of all kinds of information. Finally, it can effectively prevent the attack, ensuring the authenticity of the information not to be modified or leaks. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:2368 / 2375
页数:7
相关论文
共 50 条
  • [41] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Muhammad Arslan Akram
    Adnan Noor Mian
    Wireless Personal Communications, 2022, 126 : 1881 - 1894
  • [42] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [43] An Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1385 - 1391
  • [44] A Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 402 - 405
  • [45] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139
  • [46] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [47] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [48] Research on the Authentication of Radio Frequency Identification based on the Hash function
    Bai Zhi
    He Yi-Gang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 209 - 216
  • [49] A new hash-based authentication protocol for RFID using varying identifiers
    Li, Shu
    Yang, Xi
    Liang, Ping-yuan
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
  • [50] RFID Security Protocol Trace Attack and Desynchronizing Attack Deep Research
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Liu, Chunfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 918 - 922