Journal of Guangdong University of Technology ›› 2015, Vol. 32 ›› Issue (3): 34-38.doi: 10.3969/j.issn.1007-7162.2015.03.007
• Comprehensive Studies • Previous Articles Next Articles
Xie Guo-bo, Guo Long
Received:
Online:
Published:
Abstract: In order to ensure the safety of the RFID tag data integrity and RFID system, it is proposed that in the elliptic curve encryption double private key and double G-spot authentication protocol of RFID system, the protocol will hide tag ID in the first G point to prevent track attack. The process of Elliptic curve encryption algorithm to tag data encryption will replace the abstract process of tag data with hash function, at the same time calculate second G point. The results show that, the protocol can not only protect the integrity and security of tag data, but also prevent attacks of spoofing reader and the server.
Key words: radio frequency identification(RFID) systems; double private key; elliptic curve encryption algorithm
XIE Guo-Bo, GUO Long. Security Protocol of RFID Based on Double Private Key Elliptic Curve Cryptography[J].Journal of Guangdong University of Technology, 2015, 32(3): 34-38.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://xbzrb.gdut.edu.cn/EN/10.3969/j.issn.1007-7162.2015.03.007
https://xbzrb.gdut.edu.cn/EN/Y2015/V32/I3/34
Cited