[1]谢海宝,吕 磊.超轻量级所有权转移算法研究[J].计算机技术与发展,2021,31(10):116-121.[doi:10. 3969 / j. issn. 1673-629X. 2021. 10. 020]
 XIE Hai-bao,LYU Lei.Research on Ultra-lightweight Ownership Transfer Algorithm[J].,2021,31(10):116-121.[doi:10. 3969 / j. issn. 1673-629X. 2021. 10. 020]
点击复制

超轻量级所有权转移算法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年10期
页码:
116-121
栏目:
网络与安全
出版日期:
2021-10-10

文章信息/Info

Title:
Research on Ultra-lightweight Ownership Transfer Algorithm
文章编号:
1673-629X(2021)10-0116-06
作者:
谢海宝1 吕 磊2
1. 河南省市场监督管理局信息中心,河南 郑州 450008;
2. 河南工业大学 信息科学与工程学院,河南 郑州 450008
Author(s):
XIE Hai-bao1 LYU Lei2
1. Administration for Market Regulation of Henan Province Information Center,Zhengzhou 450008,China;
2. School of Information Science and Technology,Henan University of Technology,Zhengzhou 450008,China
关键词:
射频识别系统电子标签所有权所有权转移算法后向安全超轻量级
Keywords:
RFID systemelectronic tag ownershipownership transfer algorithmbackward securityultra-lightweight
分类号:
TP393. 08
DOI:
10. 3969 / j. issn. 1673-629X. 2021. 10. 020
摘要:
RFID 系统中电子标签使用周期过程中,电子标签所有者经常发生变化,为确保所有者变化前后每位所有者存放在电子标签中隐私信息的安全,文中设计了一种满足后向安全性的算法。 该算法采用基于位运算实现的异或交叉运算对传送信息加密,其中异或交叉运算具体实现过程中将依据加密信息汉明重量大小进行不同规则运算操作,以提升算法安全性;异或交叉运算采用按位运算方式实现,使得算法整体计算量大幅降低,算法可以达到超轻量级的级别。 对文中算法及其他不同类型所有权转移算法进行安全及性能理论分析,表明文中算法具备推广所需的要求;同时进行相同环境下的仿真实验,表明文中算法在确保降低计算时间开销的情况下,具备更好的安全性能。
Abstract:
In the RFID system,the owner of the electronic tag often changes during its service life. In order to ensure the security of the privacy information stored in the electronic tag by each owner before and after the change of the owner,a backward security algorithm is designed. In this algorithm, XOR cross operation based on bit operation is used to encrypt the transmission information. In the specific implementation process of XOR cross operation, different rules of operation will be carried out according to the Hamming weight of encrypted information,so as to enhance the security of the algorithm. The XOR cross operation is implemented by bit operation,which can greatly reduce the overall calculation amount of the algorithm which can reach the ultra-lightweight level. The theoretical analysis of the security and performance of the proposed algorithm and other different types of ownership transfer algorithm can show that the proposed algorithm has the requirements of promotion. At the same time, the simulation under the same environment shows that the proposed algorithm has better security performance under the condition of reducing the computing time cost.

相似文献/References:

[1]谢海宝,吕 磊.基于伪随机数发生器的双向认证协议[J].计算机技术与发展,2022,32(01):128.[doi:10. 3969 / j. issn. 1673-629X. 2022. 01. 022]
 XIE Hai-bao,LYU Lei.Mutual Authentication Protocol Based on Pseudo RandomNumber Generator[J].,2022,32(10):128.[doi:10. 3969 / j. issn. 1673-629X. 2022. 01. 022]

更新日期/Last Update: 2021-10-10