Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation

This paper presents an analysis of the security performance and evaluation of the hardware architecture of the redundant bit security (RBS) cryptosystem. RBS is a lightweight symmetric encryption algorithm that targets resource-constrained RFID devices. Unlike the existing cryptosystems, RBS simultaneously provides confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext data. A flexible-length hash algorithm in our optimized hardware architecture allows RBS to support different key sizes which allows flexibility in the security level. Our analysis shows the resilience of RBS against powerful and well-known attacks such as differential attacks and known-plaintext attacks. We compare the performance of the RBS cryptosystem against other distinguished ciphers developed for RFID systems. Simulation results show that RBS results in approximately 100%, 239%, and 153% higher hardware efficiencies while requiring 48%, 56%, and 59% less energy-per-bit compared to H-PRESENT, HB-2, and Grain, respectively. Such results present confirmatory evidence that RBS is a superior solution for providing security in resource-constrained systems such as RFID systems especially when authentication is a priority.

[1]  George Athanasiou,et al.  Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs , 2016, J. Circuits Syst. Comput..

[2]  Juan E. Tapiador,et al.  Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols , 2013, IEEE Sensors Journal.

[3]  Christof Paar,et al.  Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents , 2008, CARDIS.

[4]  Saurabh Kumar,et al.  Iterative and Fully Pipelined High Throughput Efficient Architectures of AES in FPGA and ASIC , 2016, J. Circuits Syst. Comput..

[5]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[6]  Bart De Decker,et al.  Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices , 2016, Secur. Commun. Networks.

[7]  Daniel W. Engels,et al.  The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.

[8]  Avishai Wool,et al.  Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.

[9]  Andrey Bogdanov,et al.  Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.

[10]  Martin Hell,et al.  Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..

[11]  A. W. Roscoe,et al.  New combinatorial bounds for universal hash functions , 2009, IACR Cryptol. ePrint Arch..

[12]  Reza Azarderakhsh,et al.  Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[13]  Guang Gong,et al.  WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Kah Phooi Seng,et al.  A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..

[16]  Salah Harb,et al.  Very Compact and Efficient 32-Bit AES Core Design Using FPGAs for Small-Footprint Low-Power Embedded Applications , 2016, J. Circuits Syst. Comput..

[17]  Martin Hell,et al.  On Hardware-Oriented Message Authentication with Applications towards RFID , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[18]  Jian Cheng,et al.  Design and Implementation of An ECC-Based Digital Baseband Controller for RFID Tag Chip , 2015, IEEE Transactions on Industrial Electronics.

[19]  Panu Hämäläinen,et al.  Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).

[20]  Magdy Bayoumi,et al.  A Novel Authenticated Cipher for RFID Systems , 2014 .

[21]  Christophe De Cannière,et al.  Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.

[22]  Magdy A. Bayoumi,et al.  RBS: Redundant Bit Security Algorithm for RFID Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[23]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.