Journal of Guangdong University of Technology ›› 2015, Vol. 32 ›› Issue (3): 34-38.doi: 10.3969/j.issn.1007-7162.2015.03.007

• Comprehensive Studies • Previous Articles     Next Articles

Security Protocol of RFID Based on Double Private Key Elliptic Curve Cryptography

Xie Guo-bo, Guo Long   

  1. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2015-01-21 Online:2015-09-22 Published:2015-09-22

Abstract: In order to ensure the safety of the RFID tag data integrity and RFID system, it is proposed that in the elliptic curve encryption double private key and double G-spot authentication protocol of RFID system, the protocol will hide tag ID in the first G point to prevent track attack. The process of Elliptic curve encryption algorithm to tag data encryption will replace the abstract process of tag data with hash function, at the same time calculate second G point. The results show that, the protocol can not only protect the integrity and security of tag data, but also prevent attacks of spoofing reader and the server.

Key words: radio frequency identification(RFID) systems; double private key; elliptic curve encryption algorithm

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!