透過您的圖書館登入
IP:18.189.2.122
  • 學位論文

利用二次剩餘的可擴充無線射頻辨識系統認證協定

Scalable RFID Authentication Protocols Using Quadratic Residues

指導教授 : 雷欽隆

摘要


隨著RFID的技術日漸成熟,各式各樣的應用相繼出現,便利了我們的生活,但RFID系統若是設計不當,有可能造成使用者隱私上的問題 (privacy problems),目前雖然已經有許多相關研究提出了各種認證協定 (authentication protocol) 來解決使用者隱私問題,但許多能夠保護使用者隱私且適用於分散式應用環境的認證協定,卻有整體系統效能不佳或擴充性不足的問題。由於二次剩餘加解密演算法的安全性高、計算量少與運算速度快,所以二次剩餘非常適合RFID系統使用。在本篇論文中,我們提出一種利用二次剩餘的新認證協定,不但能保護使用者的隱私,而且使協定具擴充性,使整個系統有效率地運作。 由於RFID的應用廣泛,各種應用的應用環境不同,所以一個協定通常無法同時滿足所有應用在安全性、效能和成本三方面的需求,因此我們將所有應用以安全需求度作區分,分別對一般安全需求的應用和安全需求較高的應用設計兩個認證協定,Protocol 1可避免passive attack的攻擊方式,Protocol 2可避免passive attacks和active attack的攻擊方式,Protocol 1和protocol 2都有很高的效率且所需的成本很低,使我們所提出的協定真正地適合商業的實作環境。

並列摘要


A radio frequency identification (RFID) system is an automatic identification technology using radio frequency. RFID applications are very useful in our daily life. A poorly-designed RFID system may cause privacy problems. Although a lot of authentication protocols have been proposed to solve privacy problems, many of them are inefficient or unscalable. Quadratic residue cryptosystems are secure, efficient, and easy to compute, therefore they are very suitable for RFID authentication protocols. In this thesis, we propose new RFID authentication protocols using quadratic residues. They not only solve privacy problems, but also make RFID systems efficient and scalable. An authentication protocol does not always satisfy security, performance and cost requirement of an application at the same time. We propose two protocols for normal security requirement and high security requirement. Protocol 1 can prevent passive attacks. Protocol 2 can prevent passive and active attacks. Both protocol 1 and protocol 2 have high performance and low cost. Our protocols are suitable for real-world commercial implementations.

參考文獻


[1]S. Weis, S. Sarma, R. Rivest, and D. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Security in Pervasive Computing 2003, 2003.
[3]D. Henrici and P. Muller, “Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers,” The Second IEEE Annual Conference of Pervasive Computing and Communications Workshops, 2004.
[4]K. Rhee, J. Kwak, S. Kim, and D. Won, “Challenge-Response Based RFID Authentication Protocol,” International Conference on Security in Pervasive Computing, 2005.
[5]G. Avoine and P. Oechslin, “A Scalable and Provably Secure Hash-Based RFID Protocol,” International Workshop on Pervasive Computing and Communication Security, 2005.
[6]S. Sarma, S. Weis, and D. Engels, “Radio-Frequency Identification: Security Risk and Challenges,” RSA Laboratories Cryptobytes, 2003.

延伸閱讀