Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance

This research has investigated the performance analysis of lightweight encryption algorithms, which are using in RFID applications. In the first part, the codes of the investigated ciphers are analyzed, and then, four encryption algorithms include TEA, HIGHT, KATAN, and KLEIN are implemented on AVR Microcontroller to evaluate the number of CPU clock cycle for each cipher. In the last part, the results of two previous parts are compared.

[1]  Yee Wei Law,et al.  KLEIN: A New Family of Lightweight Block Ciphers , 2010, RFIDSec.

[2]  Jong-Nam Kim,et al.  Symmetry structured SPN block cipher algorithm , 2009, 2009 11th International Conference on Advanced Communication Technology.

[3]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .

[4]  Yan Zhang,et al.  RFID Security: Techniques, Protocols and System-On-Chip Design , 2008 .

[5]  Emin Anarim,et al.  Security flaws in a recent RFID delegation protocol , 2011, Personal and Ubiquitous Computing.

[6]  Kenji Ohkuma,et al.  Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis , 2009, Selected Areas in Cryptography.

[7]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[8]  Jongsung Kim,et al.  HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.

[9]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[10]  Cihangir Tezcan,et al.  Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT , 2009, ACISP.

[11]  Mazdak Zamani,et al.  A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[12]  Christophe De Cannière,et al.  KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.

[13]  Vincent Rijmen,et al.  AES implementation on a grain of sand , 2005 .

[14]  Guang Gong,et al.  Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices , 2010, Financial Cryptography Workshops.

[15]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography , 2008 .

[16]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[17]  Joo Yeon Cho,et al.  Linear Cryptanalysis of Reduced-Round PRESENT , 2010, CT-RSA.

[18]  Simon J. Shepherd,et al.  The Tiny Encryption Algorithm , 2007, Cryptologia.

[19]  Christof Paar,et al.  Lightweight Cryptography and RFID: Tackling the Hidden Overhead , 2009, KSII Trans. Internet Inf. Syst..

[20]  M. Janbeglou,et al.  Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.