Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34246
Title: 利用二次剩餘的可擴充無線射頻辨識系統認證協定
Scalable RFID Authentication Protocols Using Quadratic Residues
Authors: Sheng-Wen Chung
鍾聖文
Advisor: 雷欽隆
Keyword: 無線射頻辨識系統,認證協定,二次剩餘,
RFID,Authentication Protocol,Quadratic Residue,
Publication Year : 2006
Degree: 碩士
Abstract: 隨著RFID的技術日漸成熟,各式各樣的應用相繼出現,便利了我們的生活,但RFID系統若是設計不當,有可能造成使用者隱私上的問題 (privacy problems),目前雖然已經有許多相關研究提出了各種認證協定 (authentication protocol) 來解決使用者隱私問題,但許多能夠保護使用者隱私且適用於分散式應用環境的認證協定,卻有整體系統效能不佳或擴充性不足的問題。由於二次剩餘加解密演算法的安全性高、計算量少與運算速度快,所以二次剩餘非常適合RFID系統使用。在本篇論文中,我們提出一種利用二次剩餘的新認證協定,不但能保護使用者的隱私,而且使協定具擴充性,使整個系統有效率地運作。
由於RFID的應用廣泛,各種應用的應用環境不同,所以一個協定通常無法同時滿足所有應用在安全性、效能和成本三方面的需求,因此我們將所有應用以安全需求度作區分,分別對一般安全需求的應用和安全需求較高的應用設計兩個認證協定,Protocol 1可避免passive attack的攻擊方式,Protocol 2可避免passive attacks和active attack的攻擊方式,Protocol 1和protocol 2都有很高的效率且所需的成本很低,使我們所提出的協定真正地適合商業的實作環境。
A radio frequency identification (RFID) system is an automatic identification technology using radio frequency. RFID applications are very useful in our daily life. A poorly-designed RFID system may cause privacy problems. Although a lot of authentication protocols have been proposed to solve privacy problems, many of them are inefficient or unscalable. Quadratic residue cryptosystems are secure, efficient, and easy to compute, therefore they are very suitable for RFID authentication protocols. In this thesis, we propose new RFID authentication protocols using quadratic residues. They not only solve privacy problems, but also make RFID systems efficient and scalable.
An authentication protocol does not always satisfy security, performance and cost requirement of an application at the same time. We propose two protocols for normal security requirement and high security requirement. Protocol 1 can prevent passive attacks. Protocol 2 can prevent passive and active attacks. Both protocol 1 and protocol 2 have high performance and low cost. Our protocols are suitable for real-world commercial implementations.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34246
Fulltext Rights: 有償授權
Appears in Collections:資訊網路與多媒體研究所

Files in This Item:
File SizeFormat 
ntu-95-1.pdf
  Restricted Access
354.77 kBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved