Research of RFID Authentication Protocol Based on Hash Function
Li Heng,Gao Fei,Xue Yanming,Feng Shuo
DOI: https://doi.org/10.1007/978-3-642-14350-2_22
2014-01-01
Abstract:
The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on
hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral
function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in
RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted
in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved
authentication protocol.