Mutual authentication and key agreement. In steps 3 and 4, by using the secure one-way hash function H( ) [16], the reader and the tag always verify whether the received massage authentication values (H(▇▇▇, kAj B, SK) and H(IDB, kAB, SK)) are legal corresponding party’s sending message. There- fore, the proposed AKA protocol provides the two-way mutual authentica- tion and guarantees the secrecy of the reader and the tag.
Appears in 1 contract
Mutual authentication and key agreement. In steps 3 and 4, by using the secure one-way hash function H( ) [16], the reader and the tag always verify whether the received massage authentication values (H(▇▇▇, kAj BkA′ B , SK) and H(IDB, kAB, SK)) are legal corresponding party’s sending message. There- fore, the proposed AKA protocol provides the two-way mutual authentica- tion and guarantees the secrecy of the reader and the tag.
Appears in 1 contract