DOI QR코드

DOI QR Code

AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm

  • 강민섭 (안양대학교 컴퓨터공학과)
  • Kang, Min-Sup (Dept. of Compter Engineering, Anyang University)
  • 투고 : 2012.07.23
  • 심사 : 2012.12.14
  • 발행 : 2012.12.31

초록

본 논문에서는 RFID 시스템에서 개인 정보보호를 위해 보안성이 강화된 인증 프로토콜의 설계를 제안한다. 제안된 방법에서는 AES(Advanced Encryption Standard) 암호 알고리듬을 기반으로 하여 3중 CRA(challenge response authentication) 방식을 사용한다. 또한, 개선된 인증 메카니즘의 실현을 위해 기존의 ISO/IEC 18000-3 표준을 수정한 3종류의 프로토콜 프레임 패킷 형식을 제안한다. 보안성 비교를 통하여 제안한 알고리듬이 보다 보안성이 강인함을 제시하였으며, 제안한 프로토콜의 검증을 위해 RFID Tag을 위한 디지털 Codec을 설계하였다. 설계된 Codec은 Verilog HDL을 사용하였고, Xilinx Virtex XCV400E device를 사용하여 합성을 수행하였다. 시뮬레이션 결과를 통하여 제안한 프로토콜이 안정성 향상과 함께 정확히 동작함을 보였다.

This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

키워드

참고문헌

  1. M. Jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-195, 2002
  2. Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003
  3. International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Techniques - RFID for Item Management," March 2003
  4. Martin Feldhofer, "A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004
  5. J. Yang, K. Ren, and K. Kim, "Security and Privacy on Authentication Protocol for Low-cost RFID," Proceedings of SCIS2005, Jan., pp. 25-28, 2005
  6. D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA-1)," Internet RFC 3174, September 2001
  7. Weis, S., Sarma, S., Rivest, R., and Engels, D., "Security and Privacy Aspects of Low-Cost RFIDs," Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2003
  8. Joan Daemen, Vincent Rijmen, "AES Proposal : Rijndael", (http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf)
  9. Hae-Jung Kim, Eun-jun Yoon, and Jongjung Woo, "Cryptanalysis and Improvement of an RFID Authentication Protocol Based on Private Codes, Journal of KIIT, Vol. 9, No. 5, pp. 103-110, 2011

피인용 문헌

  1. A Study of Authentication Method for Id-Based Encryption Using In M2M Environment vol.14, pp.4, 2013, https://doi.org/10.5762/KAIS.2013.14.4.1926