Advertisement

JSpongeGen: A Pseudo Random Generator for Low Resource Devices

  • Pranav Kumar SinghEmail author
  • Anish V. Monsy
  • Rajan Garg
  • Sukanta Dey
  • Sukumar Nandi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11319)

Abstract

In this paper, we develop a new lightweight pseudorandom number generator (PRNG) scheme for low-cost Radio-frequency identification (RFID) tags named JSpongeGen. EPC Gen2 RFID tags are used worldwide and considered as international standards. However, these are the low resource devices and even unable to support symmetric key based cryptographic operation. Although various promising PRNG generation schemes for RFID tags have been proposed, developing a lightweight and secure scheme which also fulfills the randomness criteria is one of the open research problems. To this end, we propose JSpongeGen, a lightweight and secure mechanism that satisfies NIST randomness tests and also fulfills EPC Gen2 randomness criteria. Our proposed scheme is based on multiple polynomial dynamic feedback shift register in which we added a sponge function to update the contents of the shift register during the change of feedback polynomial. We show that our scheme outperforms one of the promising lightweight schemes in certain randomness metrics while remaining lightweight and secure solution.

Notes

Acknowledgments

The research work has been conducted in the Information Security Education and Awareness (ISEA) Lab of Indian Institute of Technology, Guwahati. The authors would like to acknowledge IIT Guwahati and ISEA MeitY, India for the support.

References

  1. 1.
    Global, E.: EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. Version 1, 23 (2008)Google Scholar
  2. 2.
    Melià-Seguí, J., Garcia-Alfaro, J., Herrera-Joancomartí, J.: J3Gen: a PRNG for low-cost passive RFID. Sensors 13(3), 3816–3830 (2013)CrossRefGoogle Scholar
  3. 3.
    Garcia, F.D., et al.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97–114. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-88313-5_7CrossRefGoogle Scholar
  4. 4.
    Melia-Segui, J., Garcia-Alfaro, J., Herrera-Joancomartí, J.: Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags. In: IECON 2011–37th Annual Conference on IEEE Industrial Electronics Society, pp. 3820–3825. IEEE (2011)Google Scholar
  5. 5.
    Chen, J., Miyaj, A., Sato, H., Su, C.: Improved lightweight pseudo-random number generators for the low-cost RFID tags. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 17–24. IEEE (2015)Google Scholar
  6. 6.
    Lee, H., Hong, D.: The tag authentication scheme using self-shrinking generator on RFID system. Trans. Eng. Comput. Technol. 18, 52–57 (2006)Google Scholar
  7. 7.
    Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994).  https://doi.org/10.1007/3-540-48329-2_3CrossRefGoogle Scholar
  8. 8.
    Meier, W., Staffelbach, O.: The self-shrinking generator. In: Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Communications and Cryptography, pp. 287–295. Springer, Heidelberg (1994).  https://doi.org/10.1007/978-1-4615-2694-0_28CrossRefGoogle Scholar
  9. 9.
    Che, W., Deng, H., Tan, W., Wang, J.: A random number generator for application in RFID tags. In: Cole, P., Ranasinghe, D. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 279–287. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-71641-9_16CrossRefGoogle Scholar
  10. 10.
    Melià-Seguí, J., Garcia-Alfaro, J., Herrera-Joancomartí, J.: A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags. Wireless Pers. Commun. 59(1), 27–42 (2011)CrossRefGoogle Scholar
  11. 11.
    De Cannière, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006).  https://doi.org/10.1007/11836810_13CrossRefGoogle Scholar
  12. 12.
    Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wireless Mobile Comput. 2(1), 86–93 (2007)CrossRefGoogle Scholar
  13. 13.
    Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LAMEDa PRNG for EPC class-1 generation-2 RFID specification. Comput. Stand. Interfaces 31(1), 88–97 (2009)CrossRefGoogle Scholar
  14. 14.
    Martin, H., San Millán, E., Entrena, L., Lopez, P.P., Castro, J.C.H.: Akari-X: a pseudorandom number generator for secure lightweight systems (2011)Google Scholar
  15. 15.
    Mandal, K., Fan, X., Gong, G.: Design and implementation of Warbler family of lightweight pseudorandom number generators for smart devices. ACM Trans. Embed. Comput. Syst. (TECS) 15(1), 1 (2016)CrossRefGoogle Scholar
  16. 16.
    Peinado, A., Munilla, J., Fúster-Sabater, A.: EPCGen2 pseudorandom number generators: analysis of J3Gen. Sensors 14(4), 6500–6515 (2014)CrossRefGoogle Scholar
  17. 17.
    Joseph, M., Sekar, G., Balasubramanian, R.: Distinguishing attacks on (ultra-)lightweight WG ciphers. In: Bogdanov, A. (ed.) LightSec 2016. LNCS, vol. 10098, pp. 45–59. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-55714-4_4CrossRefGoogle Scholar
  18. 18.
    Nomaguchi, H., Miyaji, A., Su, C.: Evaluation and improvement of pseudo-random number generator for EPC Gen2. In: Trustcom/BigDataSE/ICESS, pp. 721–728. IEEE (2017)Google Scholar
  19. 19.
    Hellebrand, S., Rajski, J., Tarnick, S., Venkataraman, S., Courtois, B.: Built-in test for circuits with scan based on reseeding of multiple-polynomial linear feedback shift registers. IEEE Trans. Comput. 44(2), 223–233 (1995)CrossRefGoogle Scholar
  20. 20.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: ECRYPT Hash Workshop, vol. 2007. Citeseer (2007)Google Scholar
  21. 21.
    Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-23951-9_21CrossRefGoogle Scholar
  22. 22.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (2007)zbMATHGoogle Scholar
  23. 23.
    Bassham III, L.E., et al.: SP 800–22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications (2010)Google Scholar
  24. 24.
    Massey, J.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122–127 (1969)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Paar, C., Poschmann, A., Robshaw, M.: New designs in lightweight symmetric encryption. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 349–371. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-0-387-76481-8_14CrossRefGoogle Scholar
  26. 26.
    Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74735-2_31CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Pranav Kumar Singh
    • 1
    Email author
  • Anish V. Monsy
    • 1
  • Rajan Garg
    • 1
  • Sukanta Dey
    • 1
  • Sukumar Nandi
    • 1
  1. 1.Department of Computer Science and EngineeringIndian Institute of TechnologyGuwahatiIndia

Personalised recommendations