CN101217362B - RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system - Google Patents
RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system Download PDFInfo
- Publication number
- CN101217362B CN101217362B CN2007100330251A CN200710033025A CN101217362B CN 101217362 B CN101217362 B CN 101217362B CN 2007100330251 A CN2007100330251 A CN 2007100330251A CN 200710033025 A CN200710033025 A CN 200710033025A CN 101217362 B CN101217362 B CN 101217362B
- Authority
- CN
- China
- Prior art keywords
- key
- label
- public key
- encryp
- drntru
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004891 communication Methods 0.000 title claims abstract description 26
- 230000007246 mechanism Effects 0.000 title abstract description 16
- 238000000034 method Methods 0.000 claims abstract description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 230000008859 change Effects 0.000 description 7
- 238000005206 flow analysis Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 230000004224 protection Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000033772 system development Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an RFID communication safety mechanism which is established by a public key encrypting system on the base of dynamic randomization DRNTRU (Dynamic, Randomized Number Theory Research Unit). The RFID communication safety mechanism which is established by a public key encrypting system based on the dynamic randomization DRNTRU can not only effectively solve the safety problemof the RFID system. The method is novel, simple and easy to realize, does not need to fully search secret keys and TID (tag identifier) of, does not need secret key synchronization, only needs single-direction authentication and is suitable for the RFID system having limited resource and requiring high-speed responding.
Description
Technical field
The invention belongs to communication technical field, be particularly suitable for the radio-frequency (RF) tag recognition technology.
Background technology
Extensive use along with RFID (radio frequency identification), the safety problem of rfid system also becomes increasingly conspicuous, the major Safety that rfid system exists has privacy concerns, flow analysis and trackability, individual privacy leakage problem, these problems have seriously hindered further developing of RFID, become one of the urgency of rfid system development key issue to be solved.Thereby, the numerous network security scholars' of industry concern and input have also been attracted, and various solutions and strategy proposed, as use hash function, symmetric key or the like, system needs the identification code TID and the key of server exhaustive search label in back-end data base, the part system more needs the key synchronization at server and label two ends, and the algorithm of keeping server and label two ends key synchronization extremely complexity be difficult to realize, thereby all need expend ample resources such as the time of implementation and the memory space of system, and the rfid system that is not suitable for requiring high-speed response only to have limited resources again uses.So far, industry still fail to propose a safety, efficient, practical, be fit to the solution of rfid system Communication Security Problem cheaply.The present invention has proposed dynamic randomization DRNTRU (Dynamic first in the rfid system security fields, RandomizedNumberTheoryResearchUnit) public key encryp, proposition is based on the NTRU public key encryp, randomization parameter is introduced this algorithm, make it become dynamic, randomized DRTRUN public-key cryptosystem, and apply it to rfid system.The rfid system communication security mechanism of using dynamic randomization DRNTRU public key encryp to set up has not only solved the safety problem of rfid system communication effectively, and have novelty, simple, be easy to realize, do not need the key exhaustive search, do not need key synchronization, be highly suitable for having the rfid system of limited resources.
Summary of the invention
The purpose of this invention is to provide a kind of RFID communication security mechanism of setting up based on dynamic randomization DRNTRU public key encryp, this scheme can satisfy the requirement of the security mechanism of the radio communication between the read write line (Reader) and label (Tag) in middle grade and high-grade radio-frequency (RF) identification (RFID) technology.
For reaching above-mentioned purpose, the present invention is achieved by taking following technical scheme:
A kind of RFID communication security mechanism of setting up based on dynamic randomization DRNTRU public key encryp when it is characterized in that rfid system is initial, uses dynamic randomization DRNTRU public key encryp to generate PKI h by server
KeyAnd private key (f
Key, F
p), and be unique identification code TID of each label distribution, server is stored in label and back-end data base simultaneously with identification code TID and the relevant information of posting the article of this label, with PKI h
KeyAnd private key (f
Key, F
p) being stored in label and back-end data base respectively, the communication authentication protocol step of rfid system is as follows:
(1) read write line (Reader) → label (Tag): read write line is gathered L from multinomial
mIn choose a random number R
r, and to label transmission authentication request Query, simultaneously with R
rSend to label;
(2) label (Tag) → read write line (Reader) → server (Server): label is received authentication request (Query, the R that read write line is sent
r) after, at first also from multinomial set L
mIn choose a random number R
tCalculate
Again from multinomial set L
ωIn choose a random number ω, utilize PKI h
KeyC is carried out cryptographic calculation
Then with (PID, R
t) sending to read write line, read write line is again with (PID, R
t, R
r) be transmitted to server;
(3) server (Server): server is received (PID, R
t, R
r) after, at first utilize private key (f
Key, F
p), to the PID computing of decoding:
With
Obtain C, because
C is carried out R
1=Z||C transmits the (R of coming to read write line again
t, R
r) carry out
Then both are carried out XOR:
If the result is 0, then authentication is passed through, and intercepts g (C, 0,63) again, can obtain identification code TID; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation.
Dynamic randomization DRNTRU public key encryp of the present invention is based on the NTRU public key encryp, with randomization parameter R
r, R
tIntroduce the NTRU encryption system, concrete grammar is to original cryptographic algorithm
The plaintext m processing of making amendment, it is carried out
Conversion can be with randomization parameter R
r, R
tIntroduce the NTRU encryption system, make the NTRU encryption system become dynamic randomization DRNTRU public key encryp.Order: ID, R
r, R
t∈ L
m, ω ∈ L
ω, parameter p=3 of selection NTRU, then L
m{ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, represents with ID, only takies [the ID of ID
0, ID
1..., ID
63], remaining [ID
64, ID
65..., ID
N-1] be used to transmit random number R
r, R
t, definition: make v, u, w ∈ L
m, with v, u, the w vector representation, its length is N,
v=[v
0,v
1,...,v
63,v
64,v
65,...,v
N-1],
u=[u
0,u
1,...,u
63,u
64,u
65,...,u
N-1],
w=[w
0,w
1,...,w
63,w
64,w
65,...,w
N-1],
|| connect computing: w=v||u=[v
0, v
1..., v
63, u
64, u
65..., u
N-1],
G (w, i, j) intercepting computing: g (w, i, j)=[w
i, w
I+1..., w
j].
Characteristics of the present invention are:
1. dynamic randomization DRNTRU public key encryp has been proposed first.Because rfid system is followed the tracks of as anti-safety problem; anti-flow analysis; secret protections etc. have specific (special) requirements; existing NTRU public key encryp can't be realized the anti-tracking of rfid system; anti-flow analysis; the special requirement of security protections such as secret protection must make that the NTRU public key encryp has dynamically, the function of change at random.This programme is introduced this cryptographic algorithm based on the NTRU public key encryp with randomization parameter, it is become have a kind of new public key encryp---dynamic randomization DRNTRU public key encryp dynamic, the change at random function.The key that this encryption method not only has the NTRU public key encryp produces easily, encrypt, decipher rapidly, key is short and security performance is high, to characteristics such as the low occupying system resources of the performance requirement of bandwidth, processor, memory are few, and has again dynamically and the new function of change at random.
2. propose first to use dynamic randomization DRNTRU public key encryp to set up the security mechanism of rfid system, this dynamic randomization DRNTRU public key encryp is applied to rfid system, the rfid system communication security mechanism of Jian Liing thus, the special safety problem that can solve rfid system effectively and had.In addition, this programme has been realized the unilateral authentication of rfid system communication protocol, and compare unilateral authentication with two-way authentication simple more, quick, is more suitable for requiring the rfid system of high-speed response to use.Since this method only utilize plaintext m in the DRNTRU cryptographic algorithm just realized ID and
In time, transmit, and reduced the transmission time, reduced bandwidth.Whole system is only used a pair of PKI and private key, need or not key synchronization at back-end data base exhaustive search key, has reduced complicated key storage and key management system, has saved a large amount of time and the spaces of system.Because only there is server just to have private key, can unties the cipher-text information of a label, thereby only need label is carried out unilateral authentication.Again because server can directly obtain encryption identification sign indicating number TID by authentication, deciphering, thus need be in back-end data base exhaustive search identification code TID, be easy in the label of the rfid system that requires only to have at a high speed, again limited resources, implement.
The invention has the beneficial effects as follows:
The rfid system communication security mechanism that the dynamic randomization DRNTRU public key encryp that adopts the present invention to propose is set up, whole system only needs a pair of PKI and private key, the encryption that all uses public-key of all labels, server all uses the private key deciphering, using the DRNTRU public key encryp all is that dynamic random changes to the ciphertext PID that ID (TID) encrypts each generation, thereby can resist attacks such as flow analysis and tracking effectively, again because each identification code TID difference, the ID that uses the DRNTRU PKI to encrypt in the communication of back transmits PID with the ciphertext that changes, so can guarantee each label, the pid information that each authentication is read is all inequality, so can realize maintaining secrecy of the information of transmitting, the opposing Denial of Service attack, Replay Attack, active attack etc. have satisfied the specific (special) requirements of rfid system communication security mechanism.
The rfid system communication security mechanism that the dynamic randomization DRNTRU public key encryp that adopts the present invention to propose is set up, rfid system can be solved effectively and maintaining secrecy of the information of transmitting can be realized, the opposing Denial of Service attack, Replay Attack, active attack, attacks such as opposing flow analysis and tracking, and do not need exhaustive search key and label TID, do not need key updating, key storage and management are simple, have novelty, simply be easy to realize, therefore, the present invention has response speed again when efficiently solving the rfid system Communication Security Problem fast, resource requirement is few, be easy to characteristics such as realization, be very suitable for being used to set up rfid system communication security mechanism.
The security performance that following table is listed existing security protocol and security protocol of the present invention compares.
The security performance of table 1 the whole bag of tricks relatively
Description of drawings
Fig. 1 is the communication authentication agreement schematic diagram of rfid system of the present invention.
Embodiment
One, sets up dynamic randomization DRNTRU public key encryp
The 1NTRU public key encryp
The hybrid system based on polynomial algebra and logarithm p and q reduction mould is used in the encryption of NTRU public key encryp, and the non-hybrid system based on probability theory is used in deciphering.The fail safe of NTRU is based on the interaction of multinomial, not isotype hybrid operation and based on a mathematics difficult problem of seeking utmost point short vector in the number theory from very large dimension lattice.Because this algorithm has only used simple mould to take advantage of and the mould inversion operation, thereby it has the key generation easily, encrypt, decipher rapidly, key is short and security performance is high, performance requirement to bandwidth, processor, memory hangs down characteristics such as occupying system resources is few, NTRU has caused great concern in field of cryptography, and has obtained developing rapidly with perfect, has obtained good effect in actual applications.
A NTRU public key encryp is based upon three numeric parameters, and (q) the highest ordered coefficients with four integral coefficients is the multinomial set L of N-1 for N, p
f, L
g, L
ω, L
mOn.P, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd.NTRU builds on Root of Integer Polynomial ring R=Y[X]/(X
M-1) on, an elements A ∈ R can be expressed as a multinomial or a vector:
With
Come the multiplication on the representative ring R, this multiplication can be expressed as a circular convolution:
Wherein multinomial is gathered L
f, L
g, L
ω, L
mSatisfy following requirement: L
m={ coefficient of m ∈ R:m is positioned at interval [(p-1)/2, (p-1)/2] }
Definition: L (d
1, d
2)={ F ∈ R:F has d
1Individual coefficient is 1, d
2Individual coefficient is-1, and all the other coefficients are 0}, selects three positive integer d again
f, d
g, d
ω, establish multinomial set L
f, L
g, L
ωSatisfy respectively: L
f=L (d
f, d
f-1), L
g=L (d
g, d
g), L
ω=L (d
ω, d
ω)
1.1 key generates
The NTRU public key encryp is selected two polynomial f at first randomly when generating key
Key∈ L
f, g ∈ L
gRequire f
KeyContrary F about mould p and mould q
p, F
qAll exist, also promptly satisfy:
F wherein
pAnd F
qCan use the Euclidean algorithm of expansion to calculate.Calculate PKI then:
Multinomial h
KeyBe exactly the PKI of NTRU public key encryp, and polynomial f
KeyBe the private key of NTRU, simultaneously with F
pWith f
KeyPreserve together, jointly as private key.
1.2 encrypt
When communication, suppose that transmit leg S will issue message m of reciever R, S is at first from expressly collecting L
mThe message m that middle selection will send.And then from L
ωIn select a multinomial ω at random, and with the PKI h of R
KeyCalculate:
E is exactly the ciphertext that S issues R.
1.3 deciphering
After recipient R received the cipher-text message e that S sends, R was with the private key (f of oneself
Key, F
p) it is decrypted.R at first will calculate:
In [q/2, q/2], select the coefficient of a, again a is carried out
Calculate, can obtain the plaintext m that S sends again.
Wherein deciphering principle is:
Consider last multinomial
Because to the selectively strict restriction of NTRU parameter, all coefficients that almost always can guarantee it are all in [q/2, q/2], so after its coefficient carried out mould q, multinomial still remained unchanged, thereby has also just recovered former multinomial:
Again just having obtained multinomial behind a mould p
Again with F
pMultiply each other, just obtained message m again.
2 dynamic randomization DRNTRU public key encryps
Because the security mechanism of rfid system can realize maintaining secrecy of the information of transmitting except requiring, resist outside the attacks such as denial of service, playback information, also must be able to resist flow analysis, follow the tracks of the specific safety problem of attacking, solve rfid systems such as privacy.Thereby must guarantee that the identification code TID information that each label is read not only will communicate transmission with ciphertext in each authentication, but also will be with ciphertext transmission dynamic, change at random.In the NTRU public key encryp, by encrypting formula
As can be known: the ciphertext that obtains after the message m fixing to encrypted is all identical all the time, thereby can't satisfy the safety requirements of rfid system, must make that it possesses dynamically, the change at random function, thereby the present invention is based on the NTRU public key encryp, randomization parameter is introduced this algorithm, the NTRU algorithm is become have dynamic randomization DRNTRU public key encryp dynamic, the change at random ability.
In the present invention, order: ID, R
r, R
t, Z ∈ L
m, ω ∈ L
ω, for convenience of explanation, use ID, R at this
r, R
t, the vector representation form of Z.Select parameter p=3 of NTRU, then L
m{ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, available ID represents, because identification code TID is 64bits, thereby it only takies [the ID of ID
0, ID
1..., ID
63], remaining [ID
64, ID
65..., ID
N-1] in native system, be used to transmit random number.R
r, R
tThe random number of using during the expression communication authentication can be utilized [ID
64, ID
65..., ID
N-1] position transmit, so not only can successfully random number be introduced the NTRU cryptographic algorithm but also not increase call duration time and bandwidth, establish Z=[0 ..., 0].
Definition: make v, u, w ∈ L
m, with v, u, the w vector representation, its length is N,
V=[v
0, v
1..., v
63, v
64, v
65..., v
N-1] and u=[u
0, u
1..., u
63, u
64, u
65..., u
N-1]
w=[w
0,w
1,...,w
63,w
64,w
65,...,w
N-1]
|| connect computing: w=v||u=[v
0, v
1..., v
63, u
64, u
65..., u
N-1]
G (w, i, j) intercepting computing: g (w, i, j)=[w
i, w
I+1..., w
j]
Other variable, the computing used in the verification process are consistent with the NTRU public key encryp.
The concrete grammar of randomization parameter being introduced the NTRU encryption system is to original cryptographic algorithm
Plaintext m carried out revise handling, it is carried out
Conversion can be with randomization parameter R
r, R
tIntroduce this encryption system, the NTRU algorithm is become have dynamic randomization DRNTRU public key encryp dynamic, the change at random ability.
Note:
1. because ID, R
r, R
t∈ L
m, not only can use polynomial repressentation but also can use vector representation at the NTRU public key encryp, for representing consistently with NTRU, the present invention still uses polynomial repressentation, only when connecting computing and intercepting computing for ease of expressing it as Vector Processing, so ID, R
r, R
t, Z does not use black matrix small letter vector method for expressing commonly used to represent.
2. the present invention is with multinomial and random vector all are called random number at random.
Two, foundation is based on the RFID communication security mechanism of dynamic randomization DRNTRU public key encryp
2.1 condition setting at the beginning
When rfid system is initial, use the DRNTRU public key encryp to generate PKI h by server
KeyAnd private key (f
Key, F
p), and being unique identification code TID of each label distribution (can finish) by manufacturer, server is stored in label and back-end data base simultaneously with the relevant information of identification code TID and article (posting the article of this label), with PKI h
KeyAnd private key (f
Key, F
p) be stored in label and back-end data base respectively, because PKI h
KeyAnd private key (f
Key, F
p) be that system is produced by server when setting up, the private key (f that server will be wherein
Key, F
p) preserve in confidence, and with PKI h
KeyBe distributed to each label, store identification code TID into each corresponding label by escape way again simultaneously, so identification code TID and private key (f
Key, F
p) in native system, all be considered to safe and secret.
2.2 authenticating step
The communication authentication agreement of rfid system as shown in Figure 1, authenticating step is as follows:
1.Reader → Tag: read write line is gathered L from multinomial
mIn choose a random number R
r, and to label transmission authentication request Query, simultaneously with R
rSend to label;
2.Tag → Reader → Server: label is received authentication request (Query, the R that read write line is sent
r) after, at first also from multinomial set L
mIn choose a random number R
tCalculate
Again from multinomial set L
ωIn choose a random number ω, utilize PKI h
KeyC is carried out cryptographic calculation
Then with (PID, R
t) sending to read write line, read write line is again with (PID, R
t, R
r) be transmitted to server;
3.Server: server is received (PID, R
t, R
r) after, at first utilize private key (f
Key, F
p), to the PID computing of decoding:
With
Obtain C, because
C is carried out R
1=Z||C transmits the (R of coming to read write line again
t, R
r) carry out
Then both are carried out XOR:
If the result is 0, then authentication is passed through, intercept g (C again, 0,63), can obtain identification code TID (utilizing TID just can directly in back-end data base, read the label information of this identification code TID correspondence) if this identification code TID not in the back-end data base thinks also that then it is that the illegal label refusal is accepted shut-down operation; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation.
Below described variable of above-mentioned embodiment and expression formula are made an explanation:
Variable:
L
f, L
g, L
ω, L
m: the highest ordered coefficients that is four integral coefficients is the multinomial set of N-1, and satisfies following requirement: L
m={ coefficient of m ∈ R:m is positioned at interval [(p-1)/2, (p-1)/2] }, N wherein, p, q are three integers, p, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd.
R: be Root of Integer Polynomial ring R=Y[X]/(X
N-1).
A: be an elements A ∈ R, its vector form can be expressed as:
R
r: be the random number that read write line produces, R
r∈ L
m
R
t: be the random number that label produces, R
t∈ L
m
Z: be N dimension null vector, Z ∈ L
m
ID: be the vector representation form of the identification code TID of label, ID ∈ L
m
PID: be the ciphertext representation of the identification code TID vector of label, PID ∈ L
m
f
Key: by the private key of the generation of DRTUN public key encryp.
h
Key: by the PKI of the generation of DRTUN public key encryp
F
p: about the contrary F of mould p
p, also promptly satisfy:
Definition:
Definition 1. is as if a, and b is an integer, claims that then a and b are mould n congruences, are designated as a ≡ b (modn).
Define the greatest common factor (G.C.F.) that 2. nonnegative number d are called a and b, be designated as d=gcd (a, b).
Definition 3:L (d
1, d
2)={ F ∈ R:F has d
1Individual coefficient is 1, d
2Individual coefficient is-1, and all the other coefficients are 0}, selects three positive integer d again
f, d
g, d
ω, establish multinomial set L
f, L
g, L
ωSatisfy respectively: L
f=L (d
f, d
f-1), L
g=L (d
g, d
g), L
ω=L (d
ω, d
ω)
Definition 4: make v, u, w ∈ L
m, with v, u, the w vector representation, its length is N,
V=[v
0, v
1..., v
63, v
64, v
65..., v
N-1] and u=[u
0, u
1..., u
63, u
64, u
65..., u
N-1]
w=[w
0,w
1,...,w
63,w
64,w
65,...,w
N-1]
Computing:
||: for connecting computing w=v||u=[v
0, v
1..., v
63, u
64, u
65..., u
N-1]
G (w, i, j): for intercepting computing g (w, i, j)=[w
i, w
I+1..., w
j]
: the multiplication on the representative ring R, this multiplication can be expressed as a circular convolution:
Claims (2)
1. a RFID safety communicating method of setting up based on dynamic randomization DRNTRU public key encryp is characterized in that: when rfid system is initial, use dynamic randomization DRNTRU public key encryp to generate PKI h by server
KeyAnd private key (f
Key, F
p), PKI h wherein
KeyAnd private key (f
Key, F
p) the generation method is as follows:
The NTRU public key encryp is selected two polynomial f at first randomly when generating key
Key∈ L
f, g ∈ L
g, require f
KeyContrary F about mould p and mould q
p, F
qAll exist, also promptly satisfy:
F wherein
pAnd F
qCan use the Euclidean algorithm of expansion to calculate, calculate PKI then:
Multinomial h
KeyBe exactly the PKI of NTRU public key encryp, and polynomial f
KeyBe the private key of NTRU, simultaneously with F
pWith f
KeyPreserve together, jointly as private key (f
Key, F
p);
Generate PKI h
KeyAnd private key (f
Key, F
p) after, be unique identification code TID of each label distribution again, server is stored in label and back-end data base simultaneously with identification code TID and the relevant information of posting the article of this label, with PKI h
KeyAnd private key (f
Key, F
p) being stored in label and back-end data base respectively, the communication authentication protocol step of rfid system is as follows:
(1) read write line (Reader) → label (Tag): read write line is gathered L from multinomial
mIn choose a random number R
r, and to label transmission authentication request Query, simultaneously with R
rSend to label;
(2) label (Tag) → read write line (Reader) → server (Server): label is received authentication request (Query, the R that read write line is sent
r) after, at first also from multinomial set L
mIn choose a random number R
tCalculate
Again from multinomial set L
ωIn choose a random number ω, utilize PKI h
KeyC is carried out cryptographic calculation
Then with (PID, R
t) sending to read write line, read write line is again with (PID, R
t, R
r) be transmitted to server;
(3) server (Server): server is received (PID, R
t, R
r) after, at first utilize private key (f
Key, F
p), to the PID computing of decoding:
With
Obtain C, because
C is carried out R
1=Z||C transmits the (R of coming to read write line again
t, R
r) carry out
Then both are carried out XOR:
If the result is 0, then authentication is passed through, and intercepts g (C, 0,63) again, can obtain identification code TID; Otherwise, authentification failure, refusal is accepted identification code TID and shut-down operation;
The variable that relates in the such scheme, definition and oeprator are respectively described below:
L
f, L
g, L
ω, L
m: be the Root of Integer Polynomial set that four ordered coefficients the highest are N-1
P, q: be two integers, p, q needn't be prime number, (p, q)=1, and q is much larger than p but require gcd
R
r: be the random number that read write line produces, R
r∈ L
m
R
t: be the random number that label produces, R
t∈ L
m
Z: be N dimension null vector, Z ∈ L
m
ID: be the vector representation form of the identification code TID of label, ID ∈ L
m
PID: be the ciphertext representation of the identification code TID vector of label, PID ∈ L
m
f
Key: by the private key of the generation of DRTUN public key encryp
h
Key: by the PKI of the generation of DRTUN public key encryp
||: connect computing
G (C, 0,63): expression utilizes intercepting computing g (w, i, j) 0 to 63 of the vectorial C of intercepting
Mod: modulo operation
2. the RFID safety communicating method of setting up based on dynamic randomization DRNTRU public key encryp according to claim 1, it is characterized in that: described dynamic randomization DRNTRU public key encryp is based on the NTRU public key encryp, with randomization parameter R
r, R
tIntroduce the NTRU encryption system, make the NTRU encryption system become dynamic randomization DRNTRU public key encryp, randomization parameter R
r, R
tThe concrete grammar of introducing the NTRU encryption system is to original cryptographic algorithm
The plaintext m processing of making amendment, it is carried out
Conversion, ID wherein, R
r, R
t∈ L
m, ω ∈ L
ω, parameter p=3 of selection NTRU, then L
m={ coefficient of m ∈ R:m is in [1,1] interval }, identification code TID is the binary number of 64bits, represents with ID, it only takies [the ID of Id
0, ID
1..., ID
63], remaining [ID
64, ID
65..., ID
N-1] be used to transmit random number R
r, R
t
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100330251A CN101217362B (en) | 2007-12-29 | 2007-12-29 | RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100330251A CN101217362B (en) | 2007-12-29 | 2007-12-29 | RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101217362A CN101217362A (en) | 2008-07-09 |
CN101217362B true CN101217362B (en) | 2010-04-21 |
Family
ID=39623729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007100330251A Expired - Fee Related CN101217362B (en) | 2007-12-29 | 2007-12-29 | RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101217362B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107463977A (en) * | 2016-06-03 | 2017-12-12 | 质子世界国际公司 | The circuit being authenticated to card and method are read by non-contact type |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686123B (en) * | 2008-09-24 | 2012-01-25 | 中国移动通信集团公司 | Method and system for managing key, method and device for generating and authenticating key |
CN101364866B (en) * | 2008-09-24 | 2010-11-10 | 西安西电捷通无线网络通信股份有限公司 | Entity secret talk establishing system based on multiple key distribution centers and method therefor |
CN101394280B (en) * | 2008-10-30 | 2011-11-16 | 华为终端有限公司 | Mobile terminal and data service message protecting method |
CN102236773A (en) * | 2010-04-30 | 2011-11-09 | 航天信息股份有限公司 | Radio frequency identification (RFID) encryption verification system and method |
CN102136079B (en) | 2011-03-07 | 2014-08-20 | 中兴通讯股份有限公司 | Dynamic authentication method between reader and tag card and implementing device thereof |
CN102567760A (en) * | 2012-01-10 | 2012-07-11 | 广州中盈物流科讯有限公司 | One-way function-based dynamic password read-write control RFID (Radio Frequency Identification) |
CN102833072A (en) * | 2012-08-29 | 2012-12-19 | 天津广行科技有限公司 | Dynamic generation method for access key of automobile electronic information card |
CN102857344B (en) * | 2012-09-13 | 2014-12-10 | 南京三宝科技股份有限公司 | RFID (radio frequency identification) safety authentication method based on elliptic curve and symmetric cryptographic technique |
CN102930303A (en) * | 2012-09-25 | 2013-02-13 | 安徽思米来电子科技有限公司 | Active and passive radio frequency identification method and system for security domains |
CN102904723B (en) * | 2012-09-26 | 2015-07-08 | 南京三宝科技股份有限公司 | Privacy protection method of radio frequency identification device (RFID) system |
CN103065112B (en) * | 2012-12-27 | 2015-10-28 | 南京三宝科技股份有限公司 | Based on the RFID label tag anticollision recognition methods of modular arithmetic labeling |
CN103020569B (en) * | 2012-12-27 | 2016-12-07 | 南京三宝科技股份有限公司 | A kind of radio-frequency identification multi-label anti-collision method |
CN104219048B (en) * | 2013-06-04 | 2019-04-12 | 安徽大学 | A kind of the secret protection attribute method of proof and device of RFID protocol |
CN104115442B (en) * | 2013-06-20 | 2017-02-08 | 华北电力大学(保定) | RFID bidirectional authentication method based on asymmetric secret key and Hash function |
CN103532718A (en) * | 2013-10-18 | 2014-01-22 | 中国科学院信息工程研究所 | Authentication method and authentication system |
CN104217230B (en) * | 2014-08-29 | 2017-03-15 | 公安部交通管理科学研究所 | The safety certifying method of hiding ultrahigh frequency electronic tag identifier |
CN104333860A (en) * | 2014-10-31 | 2015-02-04 | 成都卫士通信息产业股份有限公司 | ZigBee security network with public key cryptography system NTRU (number theory research unit) |
CN105791317B (en) * | 2016-04-29 | 2018-12-18 | 广东工业大学 | A kind of method that RFID system key wirelessly generates |
CN108616531B (en) * | 2018-04-26 | 2021-10-08 | 深圳市盛路物联通讯技术有限公司 | Radio frequency signal secure communication method and system |
CN110085036A (en) * | 2019-05-30 | 2019-08-02 | 捷德(中国)信息科技有限公司 | A kind of deck recognition methods, license plate disassembly recognition methods and electronic license plate |
CN111586685B (en) * | 2020-04-26 | 2022-05-03 | 重庆邮电大学 | Anonymous roaming authentication method based on lattices |
CN113221131B (en) * | 2021-04-02 | 2022-09-06 | 暨南大学 | LWE-based QR code encryption and decryption method |
CN113221132B (en) * | 2021-04-02 | 2022-09-02 | 暨南大学 | QR code encryption and decryption method based on NTRU |
CN117240610B (en) * | 2023-11-13 | 2024-01-23 | 傲拓科技股份有限公司 | PLC module operation data transmission method and system based on data encryption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
GB2431545A (en) * | 2005-10-24 | 2007-04-25 | Chien Yaw Wong | RFID tag and reader with improved security |
CN101008978A (en) * | 2005-11-08 | 2007-08-01 | 萨热姆防务安全公司 | Radio frequency label identification |
CN101051903A (en) * | 2007-03-30 | 2007-10-10 | 中山大学 | RFID random key two-way certifying method accord with EPC C1G2 standard |
-
2007
- 2007-12-29 CN CN2007100330251A patent/CN101217362B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2431545A (en) * | 2005-10-24 | 2007-04-25 | Chien Yaw Wong | RFID tag and reader with improved security |
CN101008978A (en) * | 2005-11-08 | 2007-08-01 | 萨热姆防务安全公司 | Radio frequency label identification |
CN1818923A (en) * | 2006-03-17 | 2006-08-16 | 清华大学 | Enciphering authentication for radio-frequency recognition system |
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
CN101051903A (en) * | 2007-03-30 | 2007-10-10 | 中山大学 | RFID random key two-way certifying method accord with EPC C1G2 standard |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107463977A (en) * | 2016-06-03 | 2017-12-12 | 质子世界国际公司 | The circuit being authenticated to card and method are read by non-contact type |
Also Published As
Publication number | Publication date |
---|---|
CN101217362A (en) | 2008-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101217362B (en) | RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system | |
EP2228942B1 (en) | Securing communications sent by a first user to a second user | |
CN105049401B (en) | A kind of safety communicating method based on intelligent vehicle | |
CN102523093B (en) | Encapsulation method and encapsulation system for certificate-based key with label | |
US20130145169A1 (en) | Efficient authentication for mobile and pervasive computing | |
CN102025505A (en) | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device | |
US20220021526A1 (en) | Certificateless public key encryption using pairings | |
CN110535626B (en) | Secret communication method and system for identity-based quantum communication service station | |
CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
CN100495964C (en) | A light access authentication method | |
Gao et al. | Efficient certificateless anonymous multi‐receiver encryption scheme without bilinear parings | |
Harn et al. | Centralized group key establishment protocol without a mutually trusted third party | |
El Moustaine et al. | A lattice based authentication for low-cost RFID | |
Karati et al. | Provably secure and authenticated data sharing protocol for IoT‐based crowdsensing network | |
CN110225028B (en) | Distributed anti-counterfeiting system and method thereof | |
Liu et al. | Lightweight ID-based broadcast signcryption for cloud–fog-assisted IoT | |
US20040120519A1 (en) | Method for enhancing security of public key encryption schemas | |
CN111614667A (en) | Safety encryption method, device and system for real-time data transmission of power grid regulation and control information | |
WO2020115266A1 (en) | Methods and devices for secured identity-based encryption systems with two trusted centers | |
Hsia et al. | Novel hybrid public/private key cryptography based on perfect Gaussian integer sequences | |
EP2571192A1 (en) | Hybrid encryption schemes | |
CN114070549B (en) | Key generation method, device, equipment and storage medium | |
Gobi et al. | A comparative study on the performance and the security of RSA and ECC algorithm | |
CN114285580B (en) | Online and offline signcryption method from certificate-free to public key infrastructure | |
Purevjav et al. | Email encryption using hybrid cryptosystem based on Android |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100421 Termination date: 20141229 |
|
EXPY | Termination of patent right or utility model |