摘要 |
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security. |
主权项 |
1. A method comprising:
receiving a challenge at an radio frequency identification (RFID) tag from an RFID tag reader; initializing the RFID tag based upon a first public key of a first key pair, a second public key of a second key pair, and a tag ID n received from the RFID tag reader; calculating S=f(s, OE), U=f(u, Os), B=E(n, kE), G=f(A, kO), where
A is a function of the challenge and a private key of the RFID tag,s and u are random numbers,kE and ko are functions of the first public key and the second public key, respectively, andOE and OO are originators, provided by the reader; and returning S, U, B, and G from the RFID tag to the reader, the returned data being unique for each response even when responding to an identical challenge. |