Chaos Based RFID Authentication Protocol

Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved. As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.

[1]  Li-Hai Zhou,et al.  A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach , 2000 .

[2]  Leon O. Chua,et al.  Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.

[3]  K. Wong,et al.  A secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.

[4]  Ying-Cheng Lai,et al.  Controlling chaos , 1994 .

[5]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[6]  José D. P. Rolim,et al.  A Comparative Study of Performance of AES Final Candidates Using FPGAs , 2000, CHES.

[7]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[8]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[9]  Mingsheng Liu,et al.  RFID System Information Security Based on Chaotic Encryption , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[10]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[11]  Gildas Avoine,et al.  The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.

[12]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[13]  Ljupco Kocarev,et al.  From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[14]  Christini,et al.  Using noise and chaos control to control nonchaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[15]  Xiaowen Li,et al.  A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.

[16]  Michael Peter Kennedy,et al.  The role of synchronization in digital communications using chaos. I . Fundamentals of digital communications , 1997 .

[17]  K. Wong,et al.  Phase signal coupling induced n:m phase synchronization in drive-response oscillators. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[18]  Jacques Reverdy,et al.  RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.

[19]  M. Hasler,et al.  Communication by chaotic signals : the inverse system approach , 1996 .

[20]  Leon O. Chua,et al.  EXPERIMENTAL CHAOS SYNCHRONIZATION IN CHUA'S CIRCUIT , 1992 .

[21]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[22]  Juan Manuel González Nieto,et al.  Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.

[23]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[24]  Kris Gaj,et al.  Very Compact FPGA Implementation of the AES Algorithm , 2003, CHES.

[25]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[26]  Leon O. Chua,et al.  Spread Spectrum Communication Through Modulation of Chaos , 1993 .

[27]  Gerhard P. Hancke Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[28]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[29]  Jonathan Katzand,et al.  Parallel and Concurrent Security of the HB and HB + Protocols , 2006 .

[30]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[31]  Johan A. K. Suykens,et al.  Nonlinear modeling : advanced black-box techniques , 1998 .

[32]  Qurban A. Memon Synchronized chaos for network security , 2003, Comput. Commun..

[33]  Ali Miri,et al.  Chaotic masking for securing RFID systems against relay attacks , 2013, Secur. Commun. Networks.

[34]  Gerhard P. Hancke,et al.  Confidence in smart token proximity: Relay attacks revisited , 2009, Comput. Secur..

[35]  Flavio D. Garcia,et al.  A Practical Attack on the MIFARE Classic , 2008, CARDIS.

[36]  Kurths,et al.  Phase synchronization of chaotic oscillators. , 1996, Physical review letters.

[37]  Soo-Chang Pei,et al.  Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .

[38]  Yasuji Sawada,et al.  Practical Methods of Measuring the Generalized Dimension and the Largest Lyapunov Exponent in High Dimensional Chaotic Systems , 1987 .

[39]  Guido Bertoni,et al.  Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.

[40]  Gildas Avoine,et al.  An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks , 2008, ArXiv.

[41]  Gregory W. Wornell,et al.  Signal processing in the context of chaotic signals , 1992, [Proceedings] ICASSP-92: 1992 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[42]  Jonathan Katz,et al.  Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.

[43]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[44]  Kevin M. Short,et al.  Signal Extraction from Chaotic Communications , 1997 .

[45]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[46]  L. Tsimring,et al.  Generalized synchronization of chaos in directionally coupled chaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[47]  Cédric Lauradoux,et al.  When Compromised Readers Meet RFID , 2009, WISA.

[48]  Steven J. Murdoch,et al.  Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.

[49]  Holger Kantz,et al.  Practical implementation of nonlinear time series methods: The TISEAN package. , 1998, Chaos.

[50]  Flavio D. Garcia,et al.  Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[51]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[52]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[53]  Tomasz Kapitaniak,et al.  Controlling Chaos: Theoretical and Practical Methods in Non-linear Dynamics , 1996 .

[54]  M. Rosenstein,et al.  A practical method for calculating largest Lyapunov exponents from small data sets , 1993 .

[55]  Martin Hlavác,et al.  A Note on the Relay Attacks on e-passports: The Case of Czech e-passports , 2007, IACR Cryptol. ePrint Arch..

[56]  Jorge Munilla,et al.  Enhanced low-cost RFID protocol to detect relay attacks , 2010, CMC 2010.

[57]  Mustapha Djeddou,et al.  An FPGA Real-time Implementation of the Chen's Chaotic System for Securing Chaotic Communications , 2009 .

[58]  Roberto Barrio,et al.  Bounds for the chaotic region in the Lorenz model , 2009 .

[59]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[60]  James A. Yorke,et al.  Preturbulence: A regime observed in a fluid flow model of Lorenz , 1979 .

[61]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[62]  C. Sparrow The Lorenz Equations: Bifurcations, Chaos, and Strange Attractors , 1982 .

[63]  Hartmut Benner,et al.  Chaos suppression in the parametrically driven Lorenz system. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[64]  Edward Ott,et al.  Controlling chaos , 2006, Scholarpedia.

[65]  Gerhard P. Hancke Modulating a noisy carrier signal for eavesdropping-resistant HF RFID , 2007, Elektrotech. Informationstechnik.

[66]  Michael Peter Kennedy,et al.  The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization , 1998 .

[67]  Michael Peter Kennedy,et al.  Three steps to chaos. I. Evolution , 1993 .

[68]  F. Vivaldi,et al.  An algorithmic view of pseudochaos , 1999 .

[69]  Wang Shaohui Security Flaws in Two RFID Lightweight Authentication Protocols , 2011 .

[70]  A. Wolf,et al.  Determining Lyapunov exponents from a time series , 1985 .

[71]  Hongnian Yu,et al.  A RFID mutual authentication protocol based on AES algorithm , 2012, Proceedings of 2012 UKACC International Conference on Control.

[72]  Barry Saltzman,et al.  Finite Amplitude Free Convection as an Initial Value Problem—I , 1962 .

[73]  Roberto Barrio,et al.  A three-parametric study of the Lorenz model , 2007 .

[74]  Shujun Li,et al.  When Chaos Meets Computers , 2004, nlin/0405038.