Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (6): 29-30    DOI:
Current Issue | Archive | Adv Search |
A Single Tag Key Generation Algorithm Based on Syn
Liu Daowei
Guangzhou Vocational College of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In the existing RFID system, the shared key which is used in the authentication between tag and reader is set in advance, but there are some security flaws in the system. In order to solve the security problem, this paper proposes a new key wireless dynamic generation algorithm based on Syn. The algorithm uses the random number generated by the tag and the reader to generate the shared key dynamically through the Syn operation to ensure the security of the shared key. Through the security analysis, it can be found that the algorithm can effectively resist the attacks such as impersonation attack and brute force attack
Key wordsRFID      shared key      Syn      single tag     
Published: 16 November 2017
ZTFLH:  TP393  

Cite this article:

Liu Daowei. A Single Tag Key Generation Algorithm Based on Syn. Computer & Telecommunication, 2017, 1(6): 29-30.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I6/29

[1] ZHOU Lan. The Application of Promise in Wechat Applet Login[J]. 电脑与电信, 2021, 1(3): 52-55.
[2] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[3] YUE Zhi-qiYANG Chen-xiSUN Ling LI Zhu. Design and Implementation of a Bit Synchronous Clock Extraction Circuit[J]. 电脑与电信, 2019, 1(1-2): 13-16.
[4] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[5] LI Shi-zheng, YAO Jia. Research and Design of Automatic Sorting System Based on RFID[J]. 电脑与电信, 2018, 1(4): 57-59.
[6] CHENG Yi-an, WANG Zhong-qing, CHENG Yi-yuan , SHEN Zhe, ZHAO Qi-ting. Study on Sow Feeding Control System[J]. 电脑与电信, 2018, 1(4): 73-77.
[7] Liu Long, Shu Jingdong. Simulation Analysis on the Short Circuit of Synchronous Motor Based on Simulink[J]. 电脑与电信, 2017, 1(7): 62-65.
[8] Jian Biyuan. An Algorithm for Generating Group Tag Key of RFID System inWirelessWay[J]. 电脑与电信, 2017, 1(5): 35-37.
[9] XU Da-xin. Research on Single Sign-on Model in Cloud Computing Environment[J]. 电脑与电信, 2017, 1(12): 85-87.
[10] Xi Ziyu. Synergetic Development of Financial Products of Internet and Its Risk Prevention[J]. 电脑与电信, 2016, 1(7): 41-45.
[11] Yang Yang, Zhang Yufu. Analysis on the Construction of Transmitting Terminals of Computer Laboratories in Colleges[J]. 电脑与电信, 2016, 1(4): 95-96.
[12] Wu Jin. Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology[J]. 电脑与电信, 2016, 1(12): 29-31.
[13] Zhao Xiaomeng, Li Qiushi, Fang Shaoliang, Lu Zhixing. Visible Light MIMO Clock Synchronous Communication System Based on Image Sensor[J]. 电脑与电信, 2016, 1(11): 19-23.
[14] Li Haiping, Chen Rongzheng, Li Haiwen. Research and Design of Android Campus Assistant Based on JSON[J]. 电脑与电信, 2016, 1(10): 24-26.
[15] Li Liang. Simulation and Analysis of Phase Locked Loop Demodulation Signal[J]. 电脑与电信, 2015, 1(6): 21-30.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd