[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101217362B - RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system - Google Patents

RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system Download PDF

Info

Publication number
CN101217362B
CN101217362B CN2007100330251A CN200710033025A CN101217362B CN 101217362 B CN101217362 B CN 101217362B CN 2007100330251 A CN2007100330251 A CN 2007100330251A CN 200710033025 A CN200710033025 A CN 200710033025A CN 101217362 B CN101217362 B CN 101217362B
Authority
CN
China
Prior art keywords
key
label
public key
encryp
drntru
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007100330251A
Other languages
Chinese (zh)
Other versions
CN101217362A (en
Inventor
詹宜巨
蔡庆玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN2007100330251A priority Critical patent/CN101217362B/en
Publication of CN101217362A publication Critical patent/CN101217362A/en
Application granted granted Critical
Publication of CN101217362B publication Critical patent/CN101217362B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an RFID communication safety mechanism which is established by a public key encrypting system on the base of dynamic randomization DRNTRU (Dynamic, Randomized Number Theory Research Unit). The RFID communication safety mechanism which is established by a public key encrypting system based on the dynamic randomization DRNTRU can not only effectively solve the safety problemof the RFID system. The method is novel, simple and easy to realize, does not need to fully search secret keys and TID (tag identifier) of, does not need secret key synchronization, only needs single-direction authentication and is suitable for the RFID system having limited resource and requiring high-speed responding.

Description

A kind of RFID communication security mechanism of setting up based on dynamic randomization DRNTRU public key encryp
Technical field
The invention belongs to communication technical field, be particularly suitable for the radio-frequency (RF) tag recognition technology.
Background technology
Extensive use along with RFID (radio frequency identification), the safety problem of rfid system also becomes increasingly conspicuous, the major Safety that rfid system exists has privacy concerns, flow analysis and trackability, individual privacy leakage problem, these problems have seriously hindered further developing of RFID, become one of the urgency of rfid system development key issue to be solved.Thereby, the numerous network security scholars' of industry concern and input have also been attracted, and various solutions and strategy proposed, as use hash function, symmetric key or the like, system needs the identification code TID and the key of server exhaustive search label in back-end data base, the part system more needs the key synchronization at server and label two ends, and the algorithm of keeping server and label two ends key synchronization extremely complexity be difficult to realize, thereby all need expend ample resources such as the time of implementation and the memory space of system, and the rfid system that is not suitable for requiring high-speed response only to have limited resources again uses.So far, industry still fail to propose a safety, efficient, practical, be fit to the solution of rfid system Communication Security Problem cheaply.The present invention has proposed dynamic randomization DRNTRU (Dynamic first in the rfid system security fields, RandomizedNumberTheoryResearchUnit) public key encryp, proposition is based on the NTRU public key encryp, randomization parameter is introduced this algorithm, make it become dynamic, randomized DRTRUN public-key cryptosystem, and apply it to rfid system.The rfid system communication security mechanism of using dynamic randomization DRNTRU public key encryp to set up has not only solved the safety problem of rfid system communication effectively, and have novelty, simple, be easy to realize, do not need the key exhaustive search, do not need key synchronization, be highly suitable for having the rfid system of limited resources.
Summary of the invention
The purpose of this invention is to provide a kind of RFID communication security mechanism of setting up based on dynamic randomization DRNTRU public key encryp, this scheme can satisfy the requirement of the security mechanism of the radio communication between the read write line (Reader) and label (Tag) in middle grade and high-grade radio-frequency (RF) identification (RFID) technology.
For reaching above-mentioned purpose, the present invention is achieved by taking following technical scheme:
A kind of RFID communication security mechanism of setting up based on dynamic randomization DRNTRU public key encryp when it is characterized in that rfid system is initial, uses dynamic randomization DRNTRU public key encryp to generate PKI h by server KeyAnd private key (f Key, F p), and be unique identification code TID of each label distribution, server is stored in label and back-end data base simultaneously with identification code TID and the relevant information of posting the article of this label, with PKI h KeyAnd private key (f Key, F p) being stored in label and back-end data base respectively, the communication authentication protocol step of rfid system is as follows:
(1) read write line (Reader) → label (Tag): read write line is gathered L from multinomial mIn choose a random number R r, and to label transmission authentication request Query, simultaneously with R rSend to label;
(2) label (Tag) → read write line (Reader) → server (Server): label is received authentication request (Query, the R that read write line is sent r) after, at first also from multinomial set L mIn choose a random number R tCalculate
Figure G2007100330251D00021
Again from multinomial set L ωIn choose a random number ω, utilize PKI h KeyC is carried out cryptographic calculation Then with (PID, R t) sending to read write line, read write line is again with (PID, R t, R r) be transmitted to server;
(3) server (Server): server is received (PID, R t, R r) after, at first utilize private key (f Key, F p), to the PID computing of decoding:
Figure G2007100330251D00023
With
Figure G2007100330251D00024
Obtain C, because
Figure G2007100330251D00025
Figure G2007100330251D00026
C is carried out R 1=Z||C transmits the (R of coming to read write line again t, R r) carry out
Figure G2007100330251D00027
Then both are carried out XOR:
Figure G2007100330251D00028
If the result is 0, then authentication is passed through, and intercepts g (C, 0,63) again, can obtain identification code TID; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation.
Dynamic randomization DRNTRU public key encryp of the present invention is based on the NTRU public key encryp, with randomization parameter R r, R tIntroduce the NTRU encryption system, concrete grammar is to original cryptographic algorithm The plaintext m processing of making amendment, it is carried out
Figure G2007100330251D000210
Conversion can be with randomization parameter R r, R tIntroduce the NTRU encryption system, make the NTRU encryption system become dynamic randomization DRNTRU public key encryp.Order: ID, R r, R t∈ L m, ω ∈ L ω, parameter p=3 of selection NTRU, then L m{ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, represents with ID, only takies [the ID of ID 0, ID 1..., ID 63], remaining [ID 64, ID 65..., ID N-1] be used to transmit random number R r, R t, definition: make v, u, w ∈ L m, with v, u, the w vector representation, its length is N,
v=[v 0,v 1,...,v 63,v 64,v 65,...,v N-1],
u=[u 0,u 1,...,u 63,u 64,u 65,...,u N-1],
w=[w 0,w 1,...,w 63,w 64,w 65,...,w N-1],
|| connect computing: w=v||u=[v 0, v 1..., v 63, u 64, u 65..., u N-1],
G (w, i, j) intercepting computing: g (w, i, j)=[w i, w I+1..., w j].
Characteristics of the present invention are:
1. dynamic randomization DRNTRU public key encryp has been proposed first.Because rfid system is followed the tracks of as anti-safety problem; anti-flow analysis; secret protections etc. have specific (special) requirements; existing NTRU public key encryp can't be realized the anti-tracking of rfid system; anti-flow analysis; the special requirement of security protections such as secret protection must make that the NTRU public key encryp has dynamically, the function of change at random.This programme is introduced this cryptographic algorithm based on the NTRU public key encryp with randomization parameter, it is become have a kind of new public key encryp---dynamic randomization DRNTRU public key encryp dynamic, the change at random function.The key that this encryption method not only has the NTRU public key encryp produces easily, encrypt, decipher rapidly, key is short and security performance is high, to characteristics such as the low occupying system resources of the performance requirement of bandwidth, processor, memory are few, and has again dynamically and the new function of change at random.
2. propose first to use dynamic randomization DRNTRU public key encryp to set up the security mechanism of rfid system, this dynamic randomization DRNTRU public key encryp is applied to rfid system, the rfid system communication security mechanism of Jian Liing thus, the special safety problem that can solve rfid system effectively and had.In addition, this programme has been realized the unilateral authentication of rfid system communication protocol, and compare unilateral authentication with two-way authentication simple more, quick, is more suitable for requiring the rfid system of high-speed response to use.Since this method only utilize plaintext m in the DRNTRU cryptographic algorithm just realized ID and In time, transmit, and reduced the transmission time, reduced bandwidth.Whole system is only used a pair of PKI and private key, need or not key synchronization at back-end data base exhaustive search key, has reduced complicated key storage and key management system, has saved a large amount of time and the spaces of system.Because only there is server just to have private key, can unties the cipher-text information of a label, thereby only need label is carried out unilateral authentication.Again because server can directly obtain encryption identification sign indicating number TID by authentication, deciphering, thus need be in back-end data base exhaustive search identification code TID, be easy in the label of the rfid system that requires only to have at a high speed, again limited resources, implement.
The invention has the beneficial effects as follows:
The rfid system communication security mechanism that the dynamic randomization DRNTRU public key encryp that adopts the present invention to propose is set up, whole system only needs a pair of PKI and private key, the encryption that all uses public-key of all labels, server all uses the private key deciphering, using the DRNTRU public key encryp all is that dynamic random changes to the ciphertext PID that ID (TID) encrypts each generation, thereby can resist attacks such as flow analysis and tracking effectively, again because each identification code TID difference, the ID that uses the DRNTRU PKI to encrypt in the communication of back transmits PID with the ciphertext that changes, so can guarantee each label, the pid information that each authentication is read is all inequality, so can realize maintaining secrecy of the information of transmitting, the opposing Denial of Service attack, Replay Attack, active attack etc. have satisfied the specific (special) requirements of rfid system communication security mechanism.
The rfid system communication security mechanism that the dynamic randomization DRNTRU public key encryp that adopts the present invention to propose is set up, rfid system can be solved effectively and maintaining secrecy of the information of transmitting can be realized, the opposing Denial of Service attack, Replay Attack, active attack, attacks such as opposing flow analysis and tracking, and do not need exhaustive search key and label TID, do not need key updating, key storage and management are simple, have novelty, simply be easy to realize, therefore, the present invention has response speed again when efficiently solving the rfid system Communication Security Problem fast, resource requirement is few, be easy to characteristics such as realization, be very suitable for being used to set up rfid system communication security mechanism.
The security performance that following table is listed existing security protocol and security protocol of the present invention compares.
The security performance of table 1 the whole bag of tricks relatively
Figure G2007100330251D00041
Description of drawings
Fig. 1 is the communication authentication agreement schematic diagram of rfid system of the present invention.
Embodiment
One, sets up dynamic randomization DRNTRU public key encryp
The 1NTRU public key encryp
The hybrid system based on polynomial algebra and logarithm p and q reduction mould is used in the encryption of NTRU public key encryp, and the non-hybrid system based on probability theory is used in deciphering.The fail safe of NTRU is based on the interaction of multinomial, not isotype hybrid operation and based on a mathematics difficult problem of seeking utmost point short vector in the number theory from very large dimension lattice.Because this algorithm has only used simple mould to take advantage of and the mould inversion operation, thereby it has the key generation easily, encrypt, decipher rapidly, key is short and security performance is high, performance requirement to bandwidth, processor, memory hangs down characteristics such as occupying system resources is few, NTRU has caused great concern in field of cryptography, and has obtained developing rapidly with perfect, has obtained good effect in actual applications.
A NTRU public key encryp is based upon three numeric parameters, and (q) the highest ordered coefficients with four integral coefficients is the multinomial set L of N-1 for N, p f, L g, L ω, L mOn.P, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd.NTRU builds on Root of Integer Polynomial ring R=Y[X]/(X M-1) on, an elements A ∈ R can be expressed as a multinomial or a vector:
Figure G2007100330251D00051
With
Figure G2007100330251D00052
Come the multiplication on the representative ring R, this multiplication can be expressed as a circular convolution:
Figure G2007100330251D00053
C k = Σ i = 0 k A i B k - i + Σ i = k + 1 N - 1 A i B N + k - i = Σ i + j ≡ k ( mod N ) A i B j
Wherein multinomial is gathered L f, L g, L ω, L mSatisfy following requirement: L m={ coefficient of m ∈ R:m is positioned at interval [(p-1)/2, (p-1)/2] }
Definition: L (d 1, d 2)={ F ∈ R:F has d 1Individual coefficient is 1, d 2Individual coefficient is-1, and all the other coefficients are 0}, selects three positive integer d again f, d g, d ω, establish multinomial set L f, L g, L ωSatisfy respectively: L f=L (d f, d f-1), L g=L (d g, d g), L ω=L (d ω, d ω)
1.1 key generates
The NTRU public key encryp is selected two polynomial f at first randomly when generating key Key∈ L f, g ∈ L gRequire f KeyContrary F about mould p and mould q p, F qAll exist, also promptly satisfy:
Figure G2007100330251D00055
Figure G2007100330251D00056
F wherein pAnd F qCan use the Euclidean algorithm of expansion to calculate.Calculate PKI then:
Figure G2007100330251D00057
Multinomial h KeyBe exactly the PKI of NTRU public key encryp, and polynomial f KeyBe the private key of NTRU, simultaneously with F pWith f KeyPreserve together, jointly as private key.
1.2 encrypt
When communication, suppose that transmit leg S will issue message m of reciever R, S is at first from expressly collecting L mThe message m that middle selection will send.And then from L ωIn select a multinomial ω at random, and with the PKI h of R KeyCalculate:
Figure G2007100330251D00058
E is exactly the ciphertext that S issues R.
1.3 deciphering
After recipient R received the cipher-text message e that S sends, R was with the private key (f of oneself Key, F p) it is decrypted.R at first will calculate: In [q/2, q/2], select the coefficient of a, again a is carried out
Figure G2007100330251D00061
Calculate, can obtain the plaintext m that S sends again.
Wherein deciphering principle is:
a ≡ f key ⊗ e ≡ f key ⊗ pω ⊗ h key + f key ⊗ m ( mod q )
= f key ⊗ pω ⊗ F q ⊗ g + f key ⊗ m ( mod q ) (∵ h key ≡ F q ⊗ g ( mod q ) )
= pω ⊗ g + f key ⊗ m ( mod q ) (∵ F p ⊗ f key ≡ 1 ( mod p ) )
Consider last multinomial
Figure G2007100330251D00067
Because to the selectively strict restriction of NTRU parameter, all coefficients that almost always can guarantee it are all in [q/2, q/2], so after its coefficient carried out mould q, multinomial still remained unchanged, thereby has also just recovered former multinomial:
Figure G2007100330251D00068
Again just having obtained multinomial behind a mould p
Figure G2007100330251D00069
Again with F pMultiply each other, just obtained message m again.
2 dynamic randomization DRNTRU public key encryps
Because the security mechanism of rfid system can realize maintaining secrecy of the information of transmitting except requiring, resist outside the attacks such as denial of service, playback information, also must be able to resist flow analysis, follow the tracks of the specific safety problem of attacking, solve rfid systems such as privacy.Thereby must guarantee that the identification code TID information that each label is read not only will communicate transmission with ciphertext in each authentication, but also will be with ciphertext transmission dynamic, change at random.In the NTRU public key encryp, by encrypting formula
Figure G2007100330251D000610
As can be known: the ciphertext that obtains after the message m fixing to encrypted is all identical all the time, thereby can't satisfy the safety requirements of rfid system, must make that it possesses dynamically, the change at random function, thereby the present invention is based on the NTRU public key encryp, randomization parameter is introduced this algorithm, the NTRU algorithm is become have dynamic randomization DRNTRU public key encryp dynamic, the change at random ability.
In the present invention, order: ID, R r, R t, Z ∈ L m, ω ∈ L ω, for convenience of explanation, use ID, R at this r, R t, the vector representation form of Z.Select parameter p=3 of NTRU, then L m{ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, available ID represents, because identification code TID is 64bits, thereby it only takies [the ID of ID 0, ID 1..., ID 63], remaining [ID 64, ID 65..., ID N-1] in native system, be used to transmit random number.R r, R tThe random number of using during the expression communication authentication can be utilized [ID 64, ID 65..., ID N-1] position transmit, so not only can successfully random number be introduced the NTRU cryptographic algorithm but also not increase call duration time and bandwidth, establish Z=[0 ..., 0].
Definition: make v, u, w ∈ L m, with v, u, the w vector representation, its length is N,
V=[v 0, v 1..., v 63, v 64, v 65..., v N-1] and u=[u 0, u 1..., u 63, u 64, u 65..., u N-1]
w=[w 0,w 1,...,w 63,w 64,w 65,...,w N-1]
|| connect computing: w=v||u=[v 0, v 1..., v 63, u 64, u 65..., u N-1]
G (w, i, j) intercepting computing: g (w, i, j)=[w i, w I+1..., w j]
Figure G2007100330251D00071
: be XOR
Other variable, the computing used in the verification process are consistent with the NTRU public key encryp.
The concrete grammar of randomization parameter being introduced the NTRU encryption system is to original cryptographic algorithm
Figure G2007100330251D00072
Plaintext m carried out revise handling, it is carried out
Figure G2007100330251D00073
Conversion can be with randomization parameter R r, R tIntroduce this encryption system, the NTRU algorithm is become have dynamic randomization DRNTRU public key encryp dynamic, the change at random ability.
Note:
1. because ID, R r, R t∈ L m, not only can use polynomial repressentation but also can use vector representation at the NTRU public key encryp, for representing consistently with NTRU, the present invention still uses polynomial repressentation, only when connecting computing and intercepting computing for ease of expressing it as Vector Processing, so ID, R r, R t, Z does not use black matrix small letter vector method for expressing commonly used to represent.
2. the present invention is with multinomial and random vector all are called random number at random.
Two, foundation is based on the RFID communication security mechanism of dynamic randomization DRNTRU public key encryp
2.1 condition setting at the beginning
When rfid system is initial, use the DRNTRU public key encryp to generate PKI h by server KeyAnd private key (f Key, F p), and being unique identification code TID of each label distribution (can finish) by manufacturer, server is stored in label and back-end data base simultaneously with the relevant information of identification code TID and article (posting the article of this label), with PKI h KeyAnd private key (f Key, F p) be stored in label and back-end data base respectively, because PKI h KeyAnd private key (f Key, F p) be that system is produced by server when setting up, the private key (f that server will be wherein Key, F p) preserve in confidence, and with PKI h KeyBe distributed to each label, store identification code TID into each corresponding label by escape way again simultaneously, so identification code TID and private key (f Key, F p) in native system, all be considered to safe and secret.
2.2 authenticating step
The communication authentication agreement of rfid system as shown in Figure 1, authenticating step is as follows:
1.Reader → Tag: read write line is gathered L from multinomial mIn choose a random number R r, and to label transmission authentication request Query, simultaneously with R rSend to label;
2.Tag → Reader → Server: label is received authentication request (Query, the R that read write line is sent r) after, at first also from multinomial set L mIn choose a random number R tCalculate
Figure G2007100330251D00074
Again from multinomial set L ωIn choose a random number ω, utilize PKI h KeyC is carried out cryptographic calculation
Figure G2007100330251D00081
Then with (PID, R t) sending to read write line, read write line is again with (PID, R t, R r) be transmitted to server;
3.Server: server is received (PID, R t, R r) after, at first utilize private key (f Key, F p), to the PID computing of decoding:
Figure G2007100330251D00082
With
Figure G2007100330251D00083
Obtain C, because
Figure G2007100330251D00084
C is carried out R 1=Z||C transmits the (R of coming to read write line again t, R r) carry out
Figure G2007100330251D00085
Then both are carried out XOR:
Figure G2007100330251D00086
If the result is 0, then authentication is passed through, intercept g (C again, 0,63), can obtain identification code TID (utilizing TID just can directly in back-end data base, read the label information of this identification code TID correspondence) if this identification code TID not in the back-end data base thinks also that then it is that the illegal label refusal is accepted shut-down operation; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation.
Below described variable of above-mentioned embodiment and expression formula are made an explanation:
Variable:
L f, L g, L ω, L m: the highest ordered coefficients that is four integral coefficients is the multinomial set of N-1, and satisfies following requirement: L m={ coefficient of m ∈ R:m is positioned at interval [(p-1)/2, (p-1)/2] }, N wherein, p, q are three integers, p, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd.
R: be Root of Integer Polynomial ring R=Y[X]/(X N-1).
A: be an elements A ∈ R, its vector form can be expressed as:
R r: be the random number that read write line produces, R r∈ L m
R t: be the random number that label produces, R t∈ L m
Z: be N dimension null vector, Z ∈ L m
ID: be the vector representation form of the identification code TID of label, ID ∈ L m
PID: be the ciphertext representation of the identification code TID vector of label, PID ∈ L m
f Key: by the private key of the generation of DRTUN public key encryp.
h Key: by the PKI of the generation of DRTUN public key encryp
F p: about the contrary F of mould p p, also promptly satisfy:
F q: about the contrary F of mould q q, also promptly satisfy:
Figure G2007100330251D00089
Definition:
Definition 1. is as if a, and b is an integer, claims that then a and b are mould n congruences, are designated as a ≡ b (modn).
Define the greatest common factor (G.C.F.) that 2. nonnegative number d are called a and b, be designated as d=gcd (a, b).
Definition 3:L (d 1, d 2)={ F ∈ R:F has d 1Individual coefficient is 1, d 2Individual coefficient is-1, and all the other coefficients are 0}, selects three positive integer d again f, d g, d ω, establish multinomial set L f, L g, L ωSatisfy respectively: L f=L (d f, d f-1), L g=L (d g, d g), L ω=L (d ω, d ω)
Definition 4: make v, u, w ∈ L m, with v, u, the w vector representation, its length is N,
V=[v 0, v 1..., v 63, v 64, v 65..., v N-1] and u=[u 0, u 1..., u 63, u 64, u 65..., u N-1]
w=[w 0,w 1,...,w 63,w 64,w 65,...,w N-1]
Computing:
||: for connecting computing w=v||u=[v 0, v 1..., v 63, u 64, u 65..., u N-1]
G (w, i, j): for intercepting computing g (w, i, j)=[w i, w I+1..., w j]
Figure G2007100330251D00091
: be XOR
: the multiplication on the representative ring R, this multiplication can be expressed as a circular convolution:
Figure G2007100330251D00093
C k = Σ i = 0 k A i B k - i + Σ i = k + 1 N - 1 A i B N + k - i = Σ i + j ≡ k ( mod N ) A i B j

Claims (2)

1. a RFID safety communicating method of setting up based on dynamic randomization DRNTRU public key encryp is characterized in that: when rfid system is initial, use dynamic randomization DRNTRU public key encryp to generate PKI h by server KeyAnd private key (f Key, F p), PKI h wherein KeyAnd private key (f Key, F p) the generation method is as follows:
The NTRU public key encryp is selected two polynomial f at first randomly when generating key Key∈ L f, g ∈ L g, require f KeyContrary F about mould p and mould q p, F qAll exist, also promptly satisfy:
Figure F2007100330251C00011
Figure F2007100330251C00012
F wherein pAnd F qCan use the Euclidean algorithm of expansion to calculate, calculate PKI then: Multinomial h KeyBe exactly the PKI of NTRU public key encryp, and polynomial f KeyBe the private key of NTRU, simultaneously with F pWith f KeyPreserve together, jointly as private key (f Key, F p);
Generate PKI h KeyAnd private key (f Key, F p) after, be unique identification code TID of each label distribution again, server is stored in label and back-end data base simultaneously with identification code TID and the relevant information of posting the article of this label, with PKI h KeyAnd private key (f Key, F p) being stored in label and back-end data base respectively, the communication authentication protocol step of rfid system is as follows:
(1) read write line (Reader) → label (Tag): read write line is gathered L from multinomial mIn choose a random number R r, and to label transmission authentication request Query, simultaneously with R rSend to label;
(2) label (Tag) → read write line (Reader) → server (Server): label is received authentication request (Query, the R that read write line is sent r) after, at first also from multinomial set L mIn choose a random number R tCalculate
Figure F2007100330251C00014
Again from multinomial set L ωIn choose a random number ω, utilize PKI h KeyC is carried out cryptographic calculation Then with (PID, R t) sending to read write line, read write line is again with (PID, R t, R r) be transmitted to server;
(3) server (Server): server is received (PID, R t, R r) after, at first utilize private key (f Key, F p), to the PID computing of decoding:
Figure F2007100330251C00016
With
Figure F2007100330251C00017
Obtain C, because
Figure F2007100330251C00018
Figure F2007100330251C00019
C is carried out R 1=Z||C transmits the (R of coming to read write line again t, R r) carry out
Figure F2007100330251C000110
Then both are carried out XOR:
Figure F2007100330251C000111
If the result is 0, then authentication is passed through, and intercepts g (C, 0,63) again, can obtain identification code TID; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation;
The variable that relates in the such scheme, definition and oeprator are respectively described below:
L f, L g, L ω, L m: be the Root of Integer Polynomial set that four ordered coefficients the highest are N-1
P, q: be two integers, p, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd
R r: be the random number that read write line produces, R r∈ L m
R t: be the random number that label produces, R t∈ L m
Z: be N dimension null vector, Z ∈ L m
ID: be the vector representation form of the identification code TID of label, ID ∈ L m
PID: be the ciphertext representation of the identification code TID vector of label, PID ∈ L m
f Key: by the private key of the generation of DRTUN public key encryp
h Key: by the PKI of the generation of DRTUN public key encryp
F p: about the contrary F of mould p p, also promptly satisfy:
Figure F2007100330251C00021
F q: about the contrary F of mould q q, also promptly satisfy:
Figure F2007100330251C00022
||: connect computing
G (C, 0,63): expression utilizes intercepting computing g (w, i, j) 0 to 63 of the vectorial C of intercepting
Mod: modulo operation
Figure F2007100330251C00023
Be XOR
Figure F2007100330251C00024
Multiplication on the representative ring R, this multiplication can be expressed as a circular convolution:
Figure F2007100330251C00025
2. the RFID safety communicating method of setting up based on dynamic randomization DRNTRU public key encryp according to claim 1, it is characterized in that: described dynamic randomization DRNTRU public key encryp is based on the NTRU public key encryp, with randomization parameter R r, R tIntroduce the NTRU encryption system, make the NTRU encryption system become dynamic randomization DRNTRU public key encryp, randomization parameter R r, R tThe concrete grammar of introducing the NTRU encryption system is to original cryptographic algorithm
Figure F2007100330251C00026
The plaintext m processing of making amendment, it is carried out
Figure F2007100330251C00027
Conversion, ID wherein, R r, R t∈ L m, ω ∈ L ω, parameter p=3 of selection NTRU, then L m={ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, represents with ID, it only takies [the ID of Id 0, ID 1..., ID 63], remaining [ID 64, ID 65..., ID N-1] be used to transmit random number R r, R t
CN2007100330251A 2007-12-29 2007-12-29 RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system Expired - Fee Related CN101217362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100330251A CN101217362B (en) 2007-12-29 2007-12-29 RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100330251A CN101217362B (en) 2007-12-29 2007-12-29 RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system

Publications (2)

Publication Number Publication Date
CN101217362A CN101217362A (en) 2008-07-09
CN101217362B true CN101217362B (en) 2010-04-21

Family

ID=39623729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100330251A Expired - Fee Related CN101217362B (en) 2007-12-29 2007-12-29 RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system

Country Status (1)

Country Link
CN (1) CN101217362B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463977A (en) * 2016-06-03 2017-12-12 质子世界国际公司 The circuit being authenticated to card and method are read by non-contact type

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101686123B (en) * 2008-09-24 2012-01-25 中国移动通信集团公司 Method and system for managing key, method and device for generating and authenticating key
CN101364866B (en) * 2008-09-24 2010-11-10 西安西电捷通无线网络通信股份有限公司 Entity secret talk establishing system based on multiple key distribution centers and method therefor
CN101394280B (en) * 2008-10-30 2011-11-16 华为终端有限公司 Mobile terminal and data service message protecting method
CN102236773A (en) * 2010-04-30 2011-11-09 航天信息股份有限公司 Radio frequency identification (RFID) encryption verification system and method
CN102136079B (en) 2011-03-07 2014-08-20 中兴通讯股份有限公司 Dynamic authentication method between reader and tag card and implementing device thereof
CN102567760A (en) * 2012-01-10 2012-07-11 广州中盈物流科讯有限公司 One-way function-based dynamic password read-write control RFID (Radio Frequency Identification)
CN102833072A (en) * 2012-08-29 2012-12-19 天津广行科技有限公司 Dynamic generation method for access key of automobile electronic information card
CN102857344B (en) * 2012-09-13 2014-12-10 南京三宝科技股份有限公司 RFID (radio frequency identification) safety authentication method based on elliptic curve and symmetric cryptographic technique
CN102930303A (en) * 2012-09-25 2013-02-13 安徽思米来电子科技有限公司 Active and passive radio frequency identification method and system for security domains
CN102904723B (en) * 2012-09-26 2015-07-08 南京三宝科技股份有限公司 Privacy protection method of radio frequency identification device (RFID) system
CN103065112B (en) * 2012-12-27 2015-10-28 南京三宝科技股份有限公司 Based on the RFID label tag anticollision recognition methods of modular arithmetic labeling
CN103020569B (en) * 2012-12-27 2016-12-07 南京三宝科技股份有限公司 A kind of radio-frequency identification multi-label anti-collision method
CN104219048B (en) * 2013-06-04 2019-04-12 安徽大学 A kind of the secret protection attribute method of proof and device of RFID protocol
CN104115442B (en) * 2013-06-20 2017-02-08 华北电力大学(保定) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN103532718A (en) * 2013-10-18 2014-01-22 中国科学院信息工程研究所 Authentication method and authentication system
CN104217230B (en) * 2014-08-29 2017-03-15 公安部交通管理科学研究所 The safety certifying method of hiding ultrahigh frequency electronic tag identifier
CN104333860A (en) * 2014-10-31 2015-02-04 成都卫士通信息产业股份有限公司 ZigBee security network with public key cryptography system NTRU (number theory research unit)
CN105791317B (en) * 2016-04-29 2018-12-18 广东工业大学 A kind of method that RFID system key wirelessly generates
CN108616531B (en) * 2018-04-26 2021-10-08 深圳市盛路物联通讯技术有限公司 Radio frequency signal secure communication method and system
CN110085036A (en) * 2019-05-30 2019-08-02 捷德(中国)信息科技有限公司 A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate
CN111586685B (en) * 2020-04-26 2022-05-03 重庆邮电大学 Anonymous roaming authentication method based on lattices
CN113221131B (en) * 2021-04-02 2022-09-06 暨南大学 LWE-based QR code encryption and decryption method
CN113221132B (en) * 2021-04-02 2022-09-02 暨南大学 QR code encryption and decryption method based on NTRU
CN117240610B (en) * 2023-11-13 2024-01-23 傲拓科技股份有限公司 PLC module operation data transmission method and system based on data encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN1932835A (en) * 2006-09-30 2007-03-21 华中科技大学 Safety identification method in radio frequency distinguishing system
GB2431545A (en) * 2005-10-24 2007-04-25 Chien Yaw Wong RFID tag and reader with improved security
CN101008978A (en) * 2005-11-08 2007-08-01 萨热姆防务安全公司 Radio frequency label identification
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2431545A (en) * 2005-10-24 2007-04-25 Chien Yaw Wong RFID tag and reader with improved security
CN101008978A (en) * 2005-11-08 2007-08-01 萨热姆防务安全公司 Radio frequency label identification
CN1818923A (en) * 2006-03-17 2006-08-16 清华大学 Enciphering authentication for radio-frequency recognition system
CN1932835A (en) * 2006-09-30 2007-03-21 华中科技大学 Safety identification method in radio frequency distinguishing system
CN101051903A (en) * 2007-03-30 2007-10-10 中山大学 RFID random key two-way certifying method accord with EPC C1G2 standard

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463977A (en) * 2016-06-03 2017-12-12 质子世界国际公司 The circuit being authenticated to card and method are read by non-contact type

Also Published As

Publication number Publication date
CN101217362A (en) 2008-07-09

Similar Documents

Publication Publication Date Title
CN101217362B (en) RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system
EP2228942B1 (en) Securing communications sent by a first user to a second user
CN105049401B (en) A kind of safety communicating method based on intelligent vehicle
CN102523093B (en) Encapsulation method and encapsulation system for certificate-based key with label
US20130145169A1 (en) Efficient authentication for mobile and pervasive computing
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
US20220021526A1 (en) Certificateless public key encryption using pairings
CN110535626B (en) Secret communication method and system for identity-based quantum communication service station
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN100495964C (en) A light access authentication method
Gao et al. Efficient certificateless anonymous multi‐receiver encryption scheme without bilinear parings
Harn et al. Centralized group key establishment protocol without a mutually trusted third party
El Moustaine et al. A lattice based authentication for low-cost RFID
Karati et al. Provably secure and authenticated data sharing protocol for IoT‐based crowdsensing network
CN110225028B (en) Distributed anti-counterfeiting system and method thereof
Liu et al. Lightweight ID-based broadcast signcryption for cloud–fog-assisted IoT
US20040120519A1 (en) Method for enhancing security of public key encryption schemas
CN111614667A (en) Safety encryption method, device and system for real-time data transmission of power grid regulation and control information
WO2020115266A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
Hsia et al. Novel hybrid public/private key cryptography based on perfect Gaussian integer sequences
EP2571192A1 (en) Hybrid encryption schemes
CN114070549B (en) Key generation method, device, equipment and storage medium
Gobi et al. A comparative study on the performance and the security of RSA and ECC algorithm
CN114285580B (en) Online and offline signcryption method from certificate-free to public key infrastructure
Purevjav et al. Email encryption using hybrid cryptosystem based on Android

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100421

Termination date: 20141229

EXPY Termination of patent right or utility model