(34.204.201.220) 您好!臺灣時間:2021/04/20 12:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:詹仲儒
研究生(外文):Chung-ju Chan
論文名稱:利用二次剩餘增進安全性與效能在無線射頻相互驗證技術的應用上
論文名稱(外文):An improvement of Radio-Frequency Identification tag security and efficiency on mutual authentication using quadratic residues technology
指導教授:周志賢
指導教授(外文):Jue-sam Chou
學位類別:碩士
校院名稱:南華大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:20
中文關鍵詞:二元搜尋二次剩餘技術RFID無線射頻辨識雙向認證
外文關鍵詞:quadratic residuesbinary searchRFID systemmutual authentication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:145
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
  Ari Juels [1] 在2004年時提出了在同一時間相互驗證兩個Tag標籤的方法。他們宣稱提出的方法可以抵抗文中描述的一些攻擊。但我們在這篇文章中將提出他們架構的隱私性是不夠的,因為他們的方法中所傳輸的 Tag 標籤ID並沒有加密,且在公開的管道上傳送,因此攻擊者便可以攔截,造成隱私暴露的問題。另外,Kirt等人在2005年時也提出了使用簡易密碼學概念來解決隱私性的問題,不過由於server所使用同樣的Private key 而會造成off-line攻擊。之後,我們會改進他們的方法,使用二次剩餘的方式來改善隱私問題,且執行上更有效率。
  In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. However, we find that their protocol not only doesn’t possess the anonymity property but also suffers from both of the off-line and replay attacks. In 2006, Kirk H.M. Wong et al. [3] proposed an authentication scheme on RFID passive tags, attempting to as a standard for apparel products. Yet, to our view, their protocol suffers from the known-plaintext attack. In this paper, we first point out the weaknesses in the two above mentioned protocols. Then, we propose a novel efficient scheme which not only can achieve the mutual authentication between the server and tag but also possess the anonymity property needed in a RFID system.
1. Introduction.....1
  
2. Review of the two schemes.....4
2.1 Review of Ari Juels’s scheme.....4
2.1.1 Yoking-proof protocol using standard cryptographic primitives.....4
2.1.2 One-time yoking-proof using minimalist MACs.....5
2.1.3 Cryptanalysis of Ari Juels’s both methods.....6
2.2 Review of Kirk H.M. Wong et al.s’ scheme.....7
2.2.1 The protocol.....7
2.2.2 Cryptanalysis of their scheme.....9
  
3. The proposed scheme.....10
3.1 Quadratic residue theorem.....10
3.2 Notations and definitions.....10
3.3 Our scheme.....11
  
4. Security analysis.....13
  
5. Conclusion.....17
  
References.....18
[1] A. Juels, “Yoking-Proofs for RFID Tags, ”Proc. IEEE Int. Conf. Digital object identifier, 2004, pp. 138-143.
 
[2] H.Y Chien, C.H. Chen, “Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, ”Computer standards & Interfaces, 2006.
 
[3] Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, “Cryptography and authentication on RFID passive tags for apparel products, ”Computer in Industry 57, 2005, pp. 342-349.
 
[4] S. Sarma, S. Weis, D. Engels, “RFID System, Security & Privacy Implications, ”White paper, MIT Auto-ID Center, November 2002.
 
[5] S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, “Security & Privacy Aspects of Low-Cost Radio Frequency Identification Systems, ”Security in Pervasive Computing 2003, LNCS no. 2802, 2004, pp. 201-212.
 
[6] EPCglobal web site, http://www.epcglobalinc.org/
 
[7] Y.H. Ham, N.S. Kim, C.S. Pyo, J.W. Chung, “A Study on Establishment of Secure RFID Network Using DNS Security Extension, ”Asia-Pacific IEEE Int. Conf. Communications, 2005, pp. 525-529.
 
[8] G. Tsudik, “YA-TRAP: Yet Another Trivial RFID Authentication Protocol, ”Fourth Annual IEEE Int. Conf. Digital object identifier, 2006, pp. 4.
 
[9] J. Ayoade, “Security implications in RFID and authentication processing framework, “Computers & Security 25, 2006, pp. 207-212.
 
[10] D.N. Duc, J. Park, H. Lee, K. Kim, “Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, ”The 2006 Symposium on Cryptography and Information Security, 2006.
 
[11] A.D. Henrici, P. Mauller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, ”PerSec’04 at IEEE PerCom, 2004, pp. 149-153.
 
[12] S. Karthikeyan, M. Nesterenko, “RFID security without extensive cryptography, ”Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67.
 
[13] D. Molnar, D. Wagner, “Privacy and security in library RFID: issues, practices, and architectures, ”Conference on Computer and Communications Security CCS’04, 2004, pp. 210-219.
 
[14] M. Ohkubo, K. Suzki, S. Kinoshita, “Cryptographic approach to privacy-friendly tags, ”RFID Privacy Workshop, 2003.
 
[15] K. Rhee, J. Kwak, S. Kim, D. Won, “Challenge-response based RFID authentication protocol for distributed database environment, ”International Conference on Security in Pervasive Computing SPC 2005, 2005, pp. 70-84.
 
[16] J. Yang, J. Park, H. Lee, K. Ren, K. Kim, “Mutual authentication protocol for low-cost RFID, ”Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005.
 
[17] J. Yang, K. Ren, K. Kim, “Security and privacy on authentication protocol for low-cost radio, ”The 2005 Symposium on Cryptography and Information Security.
 
[18] H.Y. Chien, “Secure access control schemes for RFID systems with anonymity, ”Proc. Int. Workshop on Future Mobile and Ubiquitous Information Technologies, 2006.
 
[19] K.H. Rosen, Elementary Number Theory and Its Applications, Addison-Wesley, Reading, MA (1988).
 
[20] W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman, 1987.
 
[21] Eric Thompson, “MD5 collisions and the impact on computer forensics, “Digital investigation 2005, pp. 36-40.
 
[22] J. Saito, K. Sakurai, “Grouping Proof for RFID Tags, ”Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA’05), 2005, pp. 621-624.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔