当前位置:主页 > 科技论文 > 网络通信论文 >

RFID中轻量级加密算法及实现技术的研究

发布时间:2018-01-15 01:35

  本文关键词:RFID中轻量级加密算法及实现技术的研究 出处:《山东师范大学》2014年硕士论文 论文类型:学位论文


  更多相关文章: RFID 轻量级加密算法 椭圆曲线加密算法 PRESENT-80算法 RC4算法


【摘要】:无线射频识别(RFID,Radio Frequency Identification)技术是一种利用特定的无线频率来实现不接触、远距离信息传送的技术。该技术具有成本低、功耗小、抗污染能力强等优点,这使其在物流监管,门禁系统,电子自动收费等领域得到了迅猛发展。由于RFID技术中的信息传送是在无线信道中进行的,因此如何保障RFID中传送信息的安全性,,成了RFID系统中日益重要的问题。 加密算法是一种,对明文数据进行分散,打乱,重组,等运算处理的数学算法。使处理后的信息,显得“杂乱无章”或者“支离破碎”让未授权的截获者,即使得到了加密后的信息,但因为不知道解密的方法,仍然无法知道信息的具体内容,这就保障了信息在传送过程中的安全。这里提到的数学算法就是加密算法,解密算法是加密算法的逆运算,在加密解密过程中的参数称为该算法的密钥。加密前的信息称为明文,加密后的信息称为密文。 利用RFID技术进行信息交流的双方,都要分别对明文进行加密运算,形成密文,对方接收到密文后再利用解密算法解出原来的明文信息。加密算法从不同的角度可以分为多种,根据加解密过程中,密钥是否一样分为对称加密算法和不对称加密算法:根据明文是否要分组,分为分组加密算法和流密码加密算法:根据算法实现的复杂难易程度分为重量级加密算法,中量级级加密算法和轻量级加密算法。 不同的应用系统选择最佳适应自己的加密算法,RFID系统是硬件资源极端受限的系统,需要的是轻量级加密算法。RFID系统里的电子标签成本普遍较低,比如一张门票,一张商品标签,所以RFID系统中加密算法注重的是更小的资源消耗而不是更大加密强度。 本文了选取对称加密算法中PRESENT-80算法,RC4算法和不对称加密算法中的椭圆曲线加密算法(Elliptic Curve Cryptography,ECC)进行了研究。 之所以选择PRESENT-80算法和RC4算法是因为他们一个是分组加密算法一个是流密码算法。椭圆曲线加密算法是不对称加密算法,本身加密强度很高,如何实现其轻量化是时下很热的一个课题。 本文给出了这三种算法的加密原理,算法实现。并在AVR Studio仿真平台上以Atmega-32作为微处理器,取得了这三种算法在运行效率、密码安全强度与硬件资源开销间的比较结果,得出在硬件资源同样极端受限的环境下,改进后的椭圆加密算法不但表现较强的的密码安全度,而且还具有较高的算法运行效率,实现了算法的轻量化。
[Abstract]:Radio Frequency Identification (RFID) is a technology that utilizes specific wireless frequencies to achieve contactless. Long distance information transmission technology. This technology has the advantages of low cost, low power consumption, strong anti-pollution ability, which makes it in the logistics supervision, access control system. Since the information transmission in RFID technology is carried out in wireless channel, how to ensure the security of information transmission in RFID. It has become an increasingly important problem in RFID system. Encryption algorithm is a mathematical algorithm to disperse, disrupt, reorganize and process the plaintext data. The processed information appears to be "messy" or "fragmented" to allow unauthorized interceptors. Even if we get the encrypted information, we still can't know the specific content of the information because we don't know how to decrypt it. This ensures the security of the information in the transmission process. The mathematical algorithm mentioned here is the encryption algorithm, the decryption algorithm is the inverse operation of the encryption algorithm. The parameters in the process of encryption and decryption are called the key of the algorithm, the information before encryption is called plaintext, and the information after encryption is called ciphertext. Both sides who use RFID technology to exchange information must encrypt plaintext separately to form ciphertext. After receiving the ciphertext, the other side uses the decryption algorithm to solve the original plaintext information. The encryption algorithm can be divided into many kinds from different angles, according to the encryption and decryption process. Whether the key is equally divided into symmetric encryption algorithm and asymmetric encryption algorithm: according to whether or not to group plaintext. It is divided into block encryption algorithm and stream cipher encryption algorithm: according to the complexity of the algorithm is divided into heavyweight encryption algorithm, middle level encryption algorithm and lightweight encryption algorithm. Different application systems choose the best encryption algorithm for their own RFID system is extremely limited hardware resources of the system. What is needed is a lightweight encryption algorithm. RFID system in the electronic tag costs are generally low, such as a ticket, a commodity label. So encryption algorithms in RFID system focus on less resource consumption rather than greater encryption intensity. This paper selects the PRESENT-80 algorithm in the symmetric encryption algorithm. The elliptic curve encryption algorithm (Elliptic Curve Cryptograph) in RC4 algorithm and asymmetric encryption algorithm is studied. PRESENT-80 algorithm and RC4 algorithm are chosen because one of them is block encryption algorithm and the other is stream cipher algorithm. The elliptic curve encryption algorithm is asymmetric encryption algorithm. Encryption intensity is very high, how to achieve its lightweight is a hot topic. This paper gives the encryption principle and realization of the three algorithms, and takes Atmega-32 as the microprocessor on the AVR Studio simulation platform, and obtains the running efficiency of the three algorithms. The comparison between cryptographic security intensity and hardware resource overhead shows that the improved elliptical encryption algorithm not only shows strong cryptographic security in the environment where hardware resources are also extremely limited. Moreover, it has a high efficiency of operation, and realizes the lightening of the algorithm.
【学位授予单位】:山东师范大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4

【参考文献】

相关期刊论文 前10条

1 杨超;高海燕;;椭圆曲线密码体制理论与其安全性研究[J];电脑知识与技术;2006年17期

2 姚旭;周炜;;一种基于椭圆曲线密码的隐蔽通信[J];计算机安全;2010年02期

3 魏强;杨力生;;改进的椭圆曲线消息恢复签密方案[J];计算机安全;2010年03期

4 李学俊,敬忠良,戴冠中,张骏;基于椭圆曲线离散对数问题的公钥密码[J];计算机工程与应用;2002年06期

5 张雁,林英,郝林;椭圆曲线公钥密码体制的研究热点综述[J];计算机工程;2004年03期

6 张忠;徐秋亮;;物联网环境下UC安全的组证明RFID协议[J];计算机学报;2011年07期

7 许鸣;黄健;;面向嵌入式应用的加密算法开销与性能分析[J];计算机工程与设计;2009年23期

8 杨君辉,戴宗铎,杨栋毅刘宏伟;关于椭圆曲线密码的实现[J];通信技术;2001年06期

9 茅岑微;;适用于RFID的几种小型加密算法比较[J];中国电子商情(RFID技术与应用);2008年06期

10 李俊芳,崔建双;椭圆曲线加密算法及实例分析[J];网络安全技术与应用;2004年11期

相关博士学位论文 前1条

1 孙跃刚;椭圆曲线密码体制中若干问题的研究[D];吉林大学;2009年

相关硕士学位论文 前1条

1 惠越超;低成本RFID系统安全方案的研究[D];苏州大学;2010年



本文编号:1426240

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/1426240.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户b2569***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com