A Novel Authenticated Cipher for RFID Systems

In this paper, we present RBS (Redundant Bit Securi ty) algorithm which is a low-complexity symmetric encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data bits to change the location of the plaintext bits in the transmitted data without changing their o rder. The location of redundant bits inside the transmitted data represents the secret key between sender and receiver. The algorithm provides integrity and authentication of the original data as well. The implementation comparison of this algorithm with other algorithms confirms thatit a good candidate for resource-constraint devices such as RFID systems and wireless sensors .

[1]  Magdy A. Bayoumi,et al.  A Low-Power Parallel Architecture for Finite Galois Field GF(2m) Arithmetic Operations for Elliptic Curve Cryptography , 2012, J. Low Power Electron..

[2]  Christof Paar,et al.  Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? , 2006 .

[3]  G. P. Biswas,et al.  DESIGN OF M OBILE PUBLIC KEY INFRASTRUCTURE (M-PKI)USING ELLIPTIC CURVE CRYPT OGRAPHY , 2013 .

[4]  Daniel W. Engels,et al.  The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.

[5]  Christophe De Cannière,et al.  Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.

[6]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Christof Paar,et al.  Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents , 2008, CARDIS.

[8]  Magdy A. Bayoumi,et al.  A Flexible Architecture for Finite Field Galois Fields(2m) Arithmetic Processor , 2011, J. Low Power Electron..

[9]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[10]  Martin Hell,et al.  On Hardware-Oriented Message Authentication with Applications towards RFID , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[11]  A. W. Roscoe,et al.  New combinatorial bounds for universal hash functions , 2009, IACR Cryptol. ePrint Arch..

[12]  Vipul Gupta,et al.  A public-key cryptographic processor for RSA and ECC , 2004, Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004..

[13]  Jun Feng,et al.  Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.

[14]  Panu Hämäläinen,et al.  Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).

[15]  Martin Hell,et al.  A New Version of Grain-128 with Authentication , 2011 .

[16]  Markku-Juhani O. Saarinen Cryptanalysis of Hummingbird-1 , 2010, FSE.

[17]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[18]  Ingrid Verbauwhede,et al.  Public-Key Cryptography on the Top of a Needle , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[19]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[20]  Berk Sunar,et al.  Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic , 2004, CHES.