RFID access scheme in trusted computing platform
[ad_1]
In order to access the trusted computing platform of the radio frequency identification technology, we designed the CBC working mode based on the block cipher and the ECB working mode to provide encryption for message transmission based on the protocol standards used in the trusted network connection, and use ECC to provide encryption. Strengthen the RSA mechanism used for public key exchange. A scheme of using the authentication mode of block cipher algorithm as identity identification is proposed. Through block cipher under the action of different operation modes, radio frequency identification is connected to the trusted computing platform by modules such as random number generation and identity authentication.
1 Introduction
Trusted Computing Platform[1-3](Trusted CompuTIng Module, TCM) usually includes six parts: trusted computing architecture, mobile computing, servers, software storage, storage devices, and trusted network connections. Judging from the standards formulated by the Trusted Computing Group, data security and identity authentication are completely dependent on the level-by-level key distribution of the entire trusted platform. The peer-to-peer communication security of members of the Trusted Computing Group is not involved, and there is no professional cryptographic group. Therefore, it is obvious that many improvements can be made in terms of security protocols and authentication.
With the popularization of the theory of ubiquitous computing, trusted computing platforms have a wider range of access-almost all network application layer data can be trusted access. Radio Frequency IdenTIficaTIon (RFID), a type of non-contact automatic identification technology, will also be connected to a trusted computing platform. RFID is composed of sensor tags, readers, and remote application systems for corresponding data, usually using low frequency, high frequency or very high frequency. Unlike traditional barcodes that rely on the photoelectric effect, RFID tags do not require manual operation, and can automatically send product information to the reader under the induction of the reader, thereby realizing the automation of product information processing. RFID uses wireless signals for contactless two-way information transmission, which is convenient and flexible to use, and at the same time increases the risk of information being stolen. Different from the wired channel, the wireless channel is an open transmission platform. Anyone who has the receiving equipment of the corresponding frequency band can monitor the wireless channel.
Therefore, compared with wired channels, wireless channels are more vulnerable to man-in-the-middle attacks and are not easy to be discovered. In fact, the research and standardization of RFID security has always been in a low-end state: because cheap functions are often used, there is no special security research. This article mainly discusses the integrity, security, and unauthorized modification of RFID with regard to the access to the trusted computing platform of RFID products, combined with the different usage characteristics of the block cipher algorithm.
2. Security flaws in RFID and common countermeasures
2.1 Introduction to RFID usage
In terms of the level of use of RFID itself, at the level of the commodity supply chain, the existing system can guarantee its safety.But if it is used as an identification or secret carrier[4]In particular, considering the secure access of the network in the trusted computing platform, it is necessary to use a block cipher algorithm with a high degree of standardization of software and hardware to strengthen the security. The structure of RFID based on trusted platform Internet security access is shown in Figure 1:
We put forward some opinions through the research and tracking of RFID technology and trusted computing platform standards. The basic principles of RFID and trusted computing platform will not be repeated in this article.
2.2 The security problems of RFID
The security issues encountered by RFID are more complex than the usual computer network security issues[5]. Cryptographer Adi Shamir said that there is currently no security in RFID. It also claims to have cracked the passwords of most current mainstream RFID tags, and can carry out barrier-free attacks on almost all current RFID chips. In fact, the wireless device and transmission protocol at the front end of the RFID system are the basis for the system to process information and the basis of the entire system. In addition to the security threats commonly used by wireless systems, its tags also have specific security issues, which require multiple considerations. . Researcher Edith Cowan of the University of Perth in Australia believes that the security flaw of the first generation of RFID is that once the data is overloaded, it cannot operate normally. This vulnerability was also found in newer UHF-style RFID tags, which can affect critical RFID systems. Even the more sophisticated “second-generation RFID” that can operate at four-speed is equally difficult to deal with attacks. With the continuous expansion and popularization of the scope of use, the security of the RFID system has been paid more and more attention. The reasons why RFID information can be easily obtained through illegal authorization are:
1. The access defect of the label itself
Due to cost constraints, it is difficult for the label itself to have the ability to ensure safety. Illegal users can use a legal reader or construct a reader to directly communicate with the tag, and easily obtain the data stored in the tag.
2. Security issues on the communication link
The data communication link of RFID is a wireless communication link. Unlike a wired connection, the wireless transmission signal itself is open. Common attacks on open links include: interception of communication data; denial of service attacks, in which illegal users block the communication link by transmitting interference signals, overloading the reader and unable to receive normal tag data; using imposters to replace tags The reader sends data so that the reader processes false data, while the real data is hidden.
[ad_2]