密码编码与计算理论实验室-A-New-RFID-Protocol-with-Strong-Secur课件_第1页
密码编码与计算理论实验室-A-New-RFID-Protocol-with-Strong-Secur课件_第2页
密码编码与计算理论实验室-A-New-RFID-Protocol-with-Strong-Secur课件_第3页
密码编码与计算理论实验室-A-New-RFID-Protocol-with-Strong-Secur课件_第4页
密码编码与计算理论实验室-A-New-RFID-Protocol-with-Strong-Secur课件_第5页
已阅读5页,还剩28页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

密碼編碼與計算理論實驗室ANewRFIDProtocolwithStrongSecurityandPrivacyTian-LungLu

(呂天龍)

DepartmentofComputerScienceandInformationEngineering,

NationalTaipeiUniversity,TaiwanAdvisor:Jen-ChunChang,Hsin-LungWuDepartmentofComputerScienceandInformationEngineering,

NationalTaipeiUniversity,Taiwan1密碼編碼與計算理論實驗室OutlineIntroductionRFIDSecurityandPrivacyRelatedWorkOurProtocolAnalysisConclusion2WHATISRFID?RadioFrequencyIdentificationTag3CCCLAB國立台北大學密碼編碼與計算理論研究室RFIDAPPLICATIONS4CCCLAB國立台北大學密碼編碼與計算理論研究室Identifyfriendorfoe(1942)EventticketingCarkeysPublictransportticketingElectronicpassportSupplychainmanagementRFIDPowderAccesscontrolAnti-theftROLESOFRFIDAPPLICATIONS5CCCLAB國立台北大學密碼編碼與計算理論研究室TagsReaderServer(Database)SecurechannelRFIDPOWERPassive(thisiswhatmostlyusednow)Tagsareinactiveuntilthereader’sinterrogationsignal“wakes”themupCheap,butshortrangeonlySemi-passiveOn-boardbattery,butcannotinitiatecommunicationCanserveassensors,collectinformationfromenvironment:forexample,“smartdust”formilitaryapplicationsMoreexpensive,longerrangeActiveOn-boardbattery,caninitiatecommunication6CCCLAB國立台北大學密碼編碼與計算理論研究室RFIDSECURITYRFID=RadioFrequencyIdentificationMoreproperlyauthentication7CCCLAB國立台北大學密碼編碼與計算理論研究室CommonRFIDAttacksReplayattackMan-in-the-middleattackSpoofingattack …密碼編碼與計算理論實驗室SecurityrequirementMutualAuthenticationReplayAttackForwardSecurityDesynchronization10OwnershipTransfer密碼編碼與計算理論實驗室11OSKScheme密碼編碼與計算理論實驗室12DatabaseSearchIDTag

SavedDataSavedDataReaderProtocolPrivacySecurityApplicationDatabaseSearch

timeTAMARADesFSOTO(∞)OSK○╳╳○○╳ProtocolofDimitriou密碼編碼與計算理論實驗室13DatabaseSearchIDUpdateH2(TKID)=TK’IDTagCheckUpdateH2(TKID)=TK’ID

SavedDataSavedDataReaderProtocolPrivacySecurityApplicationDatabaseSearch

timeTAMARADesFSOTO(n)Dimitriou╳○○○○╳C2Protocol密碼編碼與計算理論實驗室14DatabaseSearchIDUpdateH2(TKID)=TK’IDTagCheckUpdateH2(TKID)=TK’ID

SavedDataSavedDataReaderProtocolPrivacySecurityApplicationDatabaseSearch

timeTAMARADesFSOTO(n)C2○○○○○╳密碼編碼與計算理論實驗室OsakaProtocol(1/6)15DatabaseNewk’Updatek’SavedDataID,k,fk(ID)ReaderTagH(fk(ID)NR)[fk(ID)fk’(ID)]fk(ID)=fk’(ID)Updatefk’(ID)SavedDatafk(ID)query,NRH(fk(ID)NR)H(fk(ID)NR),NRInfo(ID)fk(ID)fk’(ID)

fk(ID)fk’(ID)fk’(ID)密碼編碼與計算理論實驗室OsakaProtocol(2/6)16DatabaseNewk’Updatek’SavedDataID,k,fk(ID)ReaderTagH(fk(ID)NR)[fk(ID)fk’(ID)]fk(ID)=fk’(ID)Updatefk’(ID)SavedDatafk(ID)query,NRH(fk(ID)NR)H(fk(ID)NR),NRInfo(ID)fk(ID)fk’(ID)

fk(ID)fk’(ID)fk’(ID)query,NR=0H(fk(ID))H(fk(ID))密碼編碼與計算理論實驗室OsakaProtocol(3/6)17DatabaseNewk’Updatek’SavedDataID,k,fk(ID)ReaderTagH(fk(ID)NR)[fk(ID)fk’(ID)]fk(ID)=fk’(ID)Updatefk’(ID)SavedDatafk(ID)query,NRH(fk(ID)NR)H(fk(ID)NR),NRInfo(ID)fk(ID)fk’(ID)

fk(ID)fk’(ID)fk’(ID)密碼編碼與計算理論實驗室OsakaProtocol(4/6)18DatabaseNewk’Updatek’SavedDataID,k,fk(ID)ReaderTagH(fk(ID)NR)[fk(ID)fk’(ID)]fk(ID)=fk’(ID)Updatefk’(ID)SavedDatafk(ID)query,NRH(fk(ID)NR)H(fk(ID)NR),NRInfo(ID)fk(ID)fk’(ID)

fk(ID)fk’(ID)fk’(ID)fk(ID)fk’(ID)NA[fk(ID)fk’(ID)NA]fk(ID)=fk’(ID)NA密碼編碼與計算理論實驗室OsakaProtocol(5/6)ForwardSecurity19OsakaProtocol(6/6)ProtocolPrivacySecurityApplicationDatabaseSearch

timeTAMARADesFSOTO(n)Osaka╳○○╳╳○密碼編碼與計算理論實驗室20TA:TrackingAttackMA:MutualAuthenticationRA:ReplayAttackDeS:DesynchronizationFS:ForwardSecurityOT:OwnershipTransfer密碼編碼與計算理論實驗室OurProtocolSetupAuthentication21UDatabaseSearchiComputedM1=receivedM1UpdateK’andi’TagCheckM3UpdatefK’(ID),i’ReaderSavedDataSavedData密碼編碼與計算理論實驗室PrivacyAnalysisTrackingAttack23密碼編碼與計算理論實驗室SecurityAnalysisMutualAuthenticationReplayAttackForwardSecurityDesynchronization24密碼編碼與計算理論實驗室ForwardSecurity(1/2)Assumption:GivenItishardtofindX25密碼編碼與計算理論實驗室ForwardSecurity(2/2)26DataSynchronization(1/2)(DR,DT):Themaximumnumberofdesynchronizationsbetweenatagandthereaderanadversarycancreate.(RR,RT):Thecapacityaschemehastoresynchronizeatagandthereaderbycomputingthecorrespondingscale.ForagivenRFIDauthenticationscheme,ifDR≦RR

andDT≦RT

,theschemeissaidSynchronizable.密碼編碼與計算理論實驗室27密碼編碼與計算理論實驗室DataSynchronization(2/2)28Protocol(DR,DT)(RR,RT)SynchronizableOSK(∞,0)(∞,0)○Osaka(0,1)(0,0)╳Dimitriou(0,1)(0,1)○C2(1,0)(1,0)○OurProtocol(0,1)(0,1)○密碼編碼與計算理論實驗室DatabaseSearch29ProtocolDatabaseSearch

timeSearchprocedureOSKO(∞)∞OsakaO(n)1DimitriouO(n)2C2O(n)3OurprotocolO(U)→O(1)2Conclusion(1/3)ProtocolPrivacySecurityAppl

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论