跳到主要內容

臺灣博碩士論文加值系統

(44.200.86.95) 您好!臺灣時間:2024/05/30 01:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:邱煥訓
研究生(外文):Huan-Shiun Chiou
論文名稱:有效率的RFID認證協定基於二次剩餘密碼系統
論文名稱(外文):An Efficient RFID Authentication Protocol based on Quadratic Residue Cryptosystem
指導教授:吳林全
指導教授(外文):Lin-Chuan Wu
學位類別:碩士
校院名稱:中華大學
系所名稱:資訊工程學系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:45
中文關鍵詞:RFID認證二次剩餘密碼系統資訊安全
外文關鍵詞:RFIDAuthenticationQuadratic residue cryptosystemSecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:253
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:1
無線射頻辨識系統(RFID)是近幾年發展的一項相當具有潛力的技術。在2003年美國百貨業的龍頭沃爾瑪(Wal-Mart)百貨公司針對前一百大供應商,訂定在2005年前必須將所有商品附加RFID標籤的目標,為供應鏈管理的技術帶來革命性的轉變。然而,我國的行政院經濟部也於2005年率先推動一個在公有領域應用RFID的計畫,並且引導私人企業投入研發。這兩項發展引起產學界的關注,而在日後RFID也廣泛地應用在各種領域之中。

近年來RFID應用的普及,造就了我們便利的生活,但也引發了各種安全性的質疑,因此有許多學者針對這些問題提出了改善的方法。在本論文中,我們將回顧近年來的一些RFID認證協定,並針對2008年Chen等學者所提出的基於二次剩餘密碼系統所設計之RFID認證協定和2010年Yeh等學者改善Chen等學者的方法中容易遭受偽造攻擊和重送攻擊的問題提出效率方面改善的方法。

我們的方法除了能夠改善Yeh方法的效率,同時也能夠保留相同的安全性質,在標籤和伺服器各別只需要1次二次剩餘運算,比Chen的方法各需要2次和Yeh的方法各需要3次還少,所以能夠大量的減少標籤和伺服器的負擔,而其他運算的次數也明顯減少,因此非常適合用於利用二次剩餘密碼系統所設計之有效率的無線射頻辨識系統中。

Radio Frequency Identification (RFID) is the popular technology in recent years. Wal-Mart is the leader of department store in the U.S., and it requests all goods for the top 100 suppliers must be attached RFID tag before 2006. It produces a serious change with the supply chain management of RFID technology. Moreover, Ministry of Economic Affairs takes the lead promote a plan in 2005 that uses the RFID in the public places. It also guides the development of private enterprises. They raise the concerns of industry and academia. The RFID technology will be applied in each kind of domain in the future.
Recently, the popularity of RFID applications creates a convenient life. It also brings various security issues. There are many scholars presented solutions to improve these problems. In this paper, we will review some recent RFID authentication protocols. In 2008, Chen et al. presented the authentication protocol based on quadratic residue cryptosystem. Yeh et al.’s pointed out that Chen et al.’s scheme is vulnerable to impersonation attack and replay attack and submitted the improved scheme in 2010.
Our proposed scheme is not only increase efficiency in RFID, but also retains the same safety properties. It needs only one quadratic residual operation in the tag and server respectively. The total numbers of operations in our scheme are less than Chen et al.’s and Yeh et al.’s schemes. Therefore, the proposed RFID authentication scheme is better in efficiency based on quadratic residue cryptosystem.

摘 要.....................................................i
ABSTRACT..................................................ii
誌 謝.....................................................iii
目 錄.....................................................iv
表目錄....................................................vi
圖目錄....................................................vii
一、 簡介...............................................1
1.1動機...................................................2
1.2目的...................................................3
1.3大綱...................................................4
二、 背景介紹............................................5
2.1條碼...................................................5
2.2無線射頻辨識系統.........................................6
2.3無線射頻辨識系統和條碼的比較..............................9
2.4電子產品編碼 (Electronic Product Code).................10
2.5無線射頻辨識系統的安全議題...............................11
2.6二次剩餘原理及密碼系統...................................12
三、 相關研究..........................................15
3.1 雜湊鎖定方法 (Hash-Locking scheme)....................15
3.2 隨機雜湊鎖定方法 (Randomized Hash-Locking scheme)......16
3.3 Juels的方法...........................................18
3.4 Wong的方法............................................19
3.5 Chen的方法............................................21
3.6 Yeh的方法.............................................23
3.6.1初始階段.............................................23
3.6.2認證階段.............................................23
3.7 主要相關研究關係圖.....................................25
四、 我們提出的方法....................................27
4.1符號及參數表...........................................27
4.2環境變數設定...........................................28
4.3初始階段...............................................28
4.4認證階段...............................................28
五、 分析..............................................31
5.1計算量的分析............................................31
5.2安全性質的分析..........................................32
結論......................................................35
參考文獻..................................................36


[1]C.M. Roberts, “Radio frequency identification (RFID),” Computers & Security, Vol.25, No. 1, pp. 18–26, 2006.
[2]P. Rotter, “A framework for assessing RFID system security and privacy risks,” IEEE Pervasive Computing, Vol.7, No. 2, pp. 70–77, 2008.
[3]C. L. Turner, A. C. Casbard, and M. F. Murphy, “Barcode technology: its role in increasing the safety of blood transfusion,” Transfusion, Vol.43, Issue 9, pp.1200-1209, 2003.
[4]A. Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in Communications, Vol.24, No. 2, pp. 381 – 394, 2006.
[5]朱耀明, 林財世, “淺談RFID 無線射頻辨識系統技術,” 生活科技教育月刊, 三十八卷, 第二期, pp.73-87, 2005.
[6]“EPC global,” http://www.gs1.org./epcglobal.
[7]K. Finkenzeller, RFID Handbook: fundamentals and applications in contactless smart cards and identification, John Wiley & Sons, 2nd edition, 2003.
[8]B. Song and C. J. Mitchell, “RFID authentication protocol for low-cost tags,” Wireless Network Security (WISEC), pp. 140-147, 2008.
[9]D. Duc and K. Kim, “Securing HB+ against GRS man-in-the-middle attack,” Symposium on Cryptography and Information Security (SCIS), pp.123-127, 2007.
[10]S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, “Security and privacy aspects of low-cost radio frequency identification system,” Prof. of First International Conference on Security in Pervasive Computing (SPC), LNCS 2802, pp. 454-469, 2003.
[11]A. Juels, ““Yoking-Proofs” for RFID tags,” Pervasive Computing and Communications Workshops, pp. 138-143, 2004.
[12]H.M. Wong, C.L. Hui and C.K. Chan, “Cryptography and authentication on RFID passive tags for apparel products,” Computer in Industry, Vol.57 Issue 4, pp. 342-349, 2006.
[13]Y. Chen, J.S. Chou and H.M. Sun, “A novel mutual-authentication scheme based on quadratic residues for RFID systems,” Computer Network, Vol.52, Issue 12, pp. 2373-2380, August 2008.
[14]C.I Fan and C.L Lei, “Efficient blind signature scheme based on quadratic residues,” Electronics Letters, Vol.32, pp. 811-813, 1996.
[15]T.C. Yeh, C.H. Wu and Y.M. Tseng, “Improvement of the RFID authentication scheme based on quadratic residues,” Computer Communications, Vol.34, Issue 3, pp. 337-341, 2010.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top