RFID study notes

advantage: 

Compared with the traditional digital signature algorithm, it has high speed, high strength and short signature.
1. Automatic Repeat Request (ARQ)
2. Forward Error Correction (FEC)
3. Combined error detection retransmission and forward error correction Mixed error correction
channel error mode:
1 , Random errors 2, burst errors 3, mixed errors
RFID data integrity: the
unauthorized characteristics of information that can not be changed, that is, the information is kept from being accidentally or deliberately deleted, modified, forged, chaotic during storage or transmission Sequence and replay, insertion and other destruction and loss characteristics.

MD5

Methods to ensure information integrity:
1. Protocol
2. Error correction coding method
3. Password checksum method
4. Digital signature RSA
5. Notarization

 

RSA, DSA, and ECDSA
are classic algorithms and are by far the most widely used digital signature algorithms.

The key implementation of the RSA digital signature algorithm is the same as the RSA encryption algorithm, and the algorithm name is called RSA. The key generation and conversion are the same.

RSA digital signature algorithms mainly include MD and SHA. 
DSS (Digital Signature Standard): The digital signature standard 
gradually formed the DSA algorithm on the basis of DSS. 
DSA (Digital Signature Algorithm): digital signature algorithm


DSA only contains digital signatures. Certificates using DSA algorithms cannot perform encrypted communications. 
But RSA contains both digital signature algorithms and encryption and decryption.

The serial number verification algorithm of Microsoft products uses ECDSA.
ECDSA (Elliptic Curve Digital Signature Algorithm): Elliptic curve digital signature algorithm

Guess you like

Origin www.cnblogs.com/miaohua/p/12714959.html