Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 573-575.

• Interdiscipline & Application • Previous Articles     Next Articles

Application of Dual Keeloq Algorithm in Intelligent Access Control System

WU Wei-jian, CHEN Shi-guo,LI Dan   

  1. School of Physics and Electronic Science,Guizhou Normal University,Guiyang 550001,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: Access control system has always been an important part of access control system ,and Keeloq rolling code technology has a wide range of applications in intelligent access control systems,wireless door locks and other fields.This paper analyzed the encryption and decryption principle of keeloq algorithm and its application in the key code of the access control system.Summarizing some problems of single keeloq algorithm and multiple keeloq algorithm,this paper provided a kind of scheme called dual keeloq algorithm to improve its security.The dual keeloq algorithm is not a simple secondary keeloq algorithm for a key code encryption,it’s another keeloq algorithm encryption of the important field of key code on the basis of single keeloq algorithm encryption.The required information and the code length are different in the two encryption.This encryption method increases the complexity of key code.At the same time,compared to multiple keeloq encryption,it reduces the overhead of system calculation in the key code encryption and decryption process.

Key words: Intelligent access control system, Keeloq algorithm, Password attack, System security

CLC Number: 

  • TN918.4
[1]李娟,王宏大,祝慧,等.一种基于功能安全的汽车 PEPS 系统[J].农业装备与车辆工程,2014(4):57-59.
[2]COURTOIS N T,BARD G V.Algebraic and slide attacks on KeeLoq.http://eprint.iacr.org/2007/062.
[3]游建雄,李瑞林,李超.轻量级分组密码 Keeloq 的故障攻击[J].北京大学学报(自然科学版),2010,46(5):756-762.
[4]COURTOIS N T.Self-similarity attacks on block ciphers and application to keeloq [M]∥Cryptography and Security:From Theory to Applications.Springer Berlin Heidelberg,2012:55-66.
[5]刘璟,陈惠滨,叶文才.KeeLoq 算法的改进与实现[J].信号处理,2014,30(11):1335-1338.
[6]赵烽.KEELOQ 加密算法安全性探究[J].信息网络安全,2011(8):29-31.
[7]王秋燕,金晨辉.KeeLoq 密码第1种滑动-代数攻击的改进[J].计算机工程,2009,35(16):133-137.
[8]张健,任洪娥,陈宇.密码学原理及应用技术[M].北京:清华大学出版社,2014.
[9]李玲,陈惠滨.基于KEELOQ 的无线遥控车位锁系统设计[J].电子技术应用,2013,39(12):52-54.
[10]游子毅,李丹,肖文君.改进的keeloq算法及其在无钥匙进入与启动系统中的应用[J].科学技术与工程,2017,17(20):181-183.
[1] SUN Wen-yun, JIN Zhong, ZHAO Hai-tao, CHEN Chang-sheng. Cross-domain Few-shot Face Spoofing Detection Method Based on Deep Feature Augmentation [J]. Computer Science, 2021, 48(2): 330-336.
[2] FAN Jian-feng, LI Yi, WU Wen-yuan, FENG Yong. Double Blockchain Based Station Dynamic Loop Information Monitoring System [J]. Computer Science, 2019, 46(12): 155-164.
[3] JIAO Wan-ni,WU Kai-gui. Security Vulnerabilities Analysis Technology Based on Multi-core Architecture [J]. Computer Science, 2011, 38(10): 117-120.
[4] ZHAO Feng,ZHANG Qin,LI Min. Novel Dynamic Security Analysis Model for Computing System Based on DBN [J]. Computer Science, 2010, 37(2): 61-64.
[5] . [J]. Computer Science, 2007, 34(6): 124-127.
[6] . [J]. Computer Science, 2007, 34(2): 289-291.
[7] YI Xiao-Dong, YANG Xue-Jun (College of Computer, National Univ, of Defense Technology, Changsha 410073). [J]. Computer Science, 2006, 33(1): 153-157.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!