Abstract
To provide security and privacy in RFID systems, physical solutions are not suitable because of their limitations and disadvantages. Instead, cryptography is an inevitable way to make the RFID technology secure. From a theoretical point of view, standard cryptosystems might be an accurate approach. However, they demand resources far more than those available to many tags in terms of circuit size, power consumption and area. Since low-cost RFID tags are very constrained devices with severe limitations in their budget, lightweight cryptographic techniques are the most appropriate solution for such RFID tags. In this chapter, the characteristic of a lightweight cryptosystem are defined. Then, a set of the well-known and most recent lightweight cryptography implementations is presented. This survey covers the recent hardware implementations of symmetric as well as asymmetric ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agren, M., Hell, M., Johansson, T.: On hardware-oriented message authentication with applications towards RFID. In: Proceedings of International Workshop on Lightweight Security & Privacy [LightSec] (2011)
Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wire. Mob. Comput. 5 (1), 48–59 (2011)
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Public-key cryptography on the top of a needle. In: Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS’07 (2007)
Bellare, M., Canetti, R., Krawczyk, H.: Keyed hash functions and message authentication. In: Advances in Cryptology - CRYPTO. Lecture Notes in Computer Science, pp. 1–15 (1996)
Biryukov, A., Canniere, C.D., Dellkrantz, G.: Cryptanalysis of SAFER++. In: Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Springer, Berlin (2003)
Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Advances in Cryptology - ASIACRYPT 2011. Lecture Notes in Computer Science, vol. 7073, pp. 344–371. Springer, Berlin (2011)
Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin (2007)
Chai, Q., Gong, G.: A cryptanalysis of hummingbird-2: the differential sequence analysis. IACR Cryptology ePrint Archive (2012). http://eprint.iacr.org/2012/233
Cho, J.: Linear cryptanalysis of reduced-round present. In: Topics in Cryptology - CT-RSA 2010. Lecture Notes in Computer Science, vol. 5985, pp. 302–317. Springer, Berlin (2010)
Collard, B., Standaert, F.X.: A statistical saturation attack against the block cipher PRESENT. In: Proceedings OF CT-RSA 2009. Lecture Notes in Computer Science, vol. 5473. pp. 195–210. Springer, Berlin (2009)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Berlin (2002)
De Canniére, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Information Security. Lecture Notes in Computer Science, vol. 4176, pp. 171–186. Springer, Berlin (2006)
Department of Commerce, U.S.: Data encryption standard. FIPS Publication (1977)
Department of Commerce, U.S.: Recommendation for the triple data encryption algorithm (TDEA) block cipher. Information Security (2004)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22 (6), 644–654 (1976)
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. IACR Cryptology ePrint Archive (2008). http://eprint.iacr.org/2008/385
Eastlake, D.: US secure hash algorithm 1 (SHA1). RFC 3174 (2001)
Eberle, H., Gura, N., Shantz, S.C., Gupta, V., Rarick, L., Sundaram, S.: A public-key cryptographic processor for RSA and ECC. In: Proceedings of IEEE International Conference on Application-Specific Systems, Architectures and Processors (2004)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)
Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: Ultra-lightweight cryptography for resource-constrained devices. In: Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 6054, pp. 3–18. Springer, Berlin (2010)
Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security [RFIDSec] (2011)
Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, vol. 4277, pp. 372–381. Springer, Berlin (2006)
Fan, X., Mandal, K., Gong, G.: WG-8: a lightweight stream cipher for resource-constrained smart devices. EAI Endorsed Trans. Secur. Saf. 15 (3), 151–157 (2015)
Feldhofer, M.: Comparison of low-power implementations of trivium and grain. eSTREAM, ECRYPT Stream Cipher Project (2007)
Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. In: IEE Proceedings - Information Security, vol. 152, pp. 13–20 (2005)
Gaubatz, G., Öztürk, E., Kaps, J.P., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops (2005)
Gilbert, H., Peyrin, T.: Super-Sbox cryptanalysis: improved attacks for AES-like permutations. IACR Cryptology ePrint Archive (2009). http://eprint.iacr.org/2009/531
Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: State of the Artof Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191–204 (2007)
Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD ’06 (2006)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2004)
Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2 (1), 86–93 (2007)
Hoffstein, J., Pipher, J., Silverman, J.: NTRU: a ring based public key cryptosystem. In: Proceedings of Algorithmic Number Theory (ANTS III) (1998)
Huang, Q., Kobayashi, H., Liu, B.: Modeling of distributed denial of service attacks in wireless networks. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (2003)
Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 293–308. Springer, Berlin (2005)
Kahn, D.: The Codebreakers. Macmillan, New York (1996)
Kaliski, B.: MD2 message digest algorithm. RFC 1319 (1992)
Kaps, J.P.: Cryptography for ultra-low power devices. Ph.D. thesis, Worcester Polytechnic Institute, Worcester, MA (2006)
Kaps, J.P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 4097, pp. 372–381. Springer, Berlin (2006)
Kobilitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
Kucuk, O.: Slide resynchronization attack on the initialization of grain 1.0. eSTREAM, ECRYPT Stream Cipher Project (2006)
Kumar, S.S., Paar, C.: Are standards compliant elliptic curve cryptosystems feasible on RFID? In: Proceedings of Workshop on RFID Security (2006)
Kumar, M., Yadav, P., Kumari, M.: Flaws in differential cryptanalysis of reduced round PRESENT. IACR Cryptology ePrint Archive (2010). http://eprint.iacr.org/2010/407
Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 57 (11), 1514–1527 (2008)
Lee, K.S., Chun, J.H., Kwon, K.W.: A low power CMOS compatible embedded EEPROM for passive RFID tag. Microelectron. J. 41 (10), 662–668 (2010)
Lehmann, M., Meier, W.: Conditional differential cryptanalysis of grain-128a. In: Cryptology and Network Security. Lecture Notes in Computer Science, vol. 7712, pp. 1–11. Springer, Berlin (2012)
Luo, P., Wang, X., Feng, J., Xu, Y.: Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In: Proceedings of Solid-State and Integrated-Circuit Technology (2008)
Maximov, A., Biryukov, A.: Two trivial attacks on trivium. IACR Cryptology ePrint Archive (2007). http://eprint.iacr.org/2007/021
Miller, V.: Uses of elliptic curves in cryptography. In: Advances in Cryptology - CRYPTO. Lecture Notes in Computer Science, pp. 417–426. Springer, Berlin (1985)
Nakahara Jorge, J., Sepehrdad, P., Zhang, B., Wang, M.: Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Cryptology and Network Security. Lecture Notes in Computer Science, vol. 5888, pp. 58–75. Springer, Berlin (2009)
Nie, T., Zhang, T.: A study of DES and blowfish encryption algorithm. In: Proceedings of IEEE Region 10 Conference [TENCON] (2009)
Ohkuma, K.: Weak keys of reduced-round PRESENT for linear cryptanalysis. In: Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp. 249–265. Springer, Berlin (2009)
Özen, O., Varıcı, K., Tezcan, C., Kocair, C.: Lightweight block ciphers revisited: cryptanalysis of reduced round present and hight. In: Information Security and Privacy. Lecture Notes in Computer Science, vol. 5594, pp. 90–107. Springer, Berlin (2009)
Öztürk, E., Sunar, B.: Low-power elliptic curve cryptography using scaled modular arithmetic. In: Proceedings of 6th International Workshop on Cryptographic Hardware in Embedded Systems (CHES). Lecture Notes in Computer Science, vol. 3156, pp. 92–106. Springer, Berlin (2004)
Poschmann, A.: Lightweight cryptography: cryptographic engineering for a pervasive world. Ph.D. thesis, Ruhr-University Bochum (2009)
Rabin, M.: Digital signatures and public-key functions as intractable as factorization. Technical Report mit/lcs/tr-212, Massachusetts Institute of Technology (1978)
Raddum, H.: Cryptanalytic results on trivium. eSTREAM submitted papers (2006). http://www.ecrypt.eu.org/stream/papersdir/2006/039.ps
Reeds, J., Sloane, N.: Shift-register synthesis (modulo m). SIAM J. Comput. 14, 505–513 (1985)
Rijmen, V.: Practical-titled attack on AES-128 using chosen-text relations. IACR Cryptology ePrint Archive (2010). http://eprint.iacr.org/2010/337
Rivest, R.: The MD4 message digest algorithm. In: Advances in Cryptology - CRYPTO. Lecture Notes in Computer Science. Springer, Berlin (1990)
Rivest, R.: The md5 message-digest algorithm. RFC 1321 (1992)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 (2), 120–126 (1978)
Saarinen, M.J.O.: Cryptanalysis of Hummingbird-1. In: Fast Software Encryption. Lecture Notes in Computer Science, vol. 6733, pp. 328–341. Springer, Berlin (2011)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28, 656–715 (1949)
Sundaram, A.: An introduction to intrusion detection. Crossroads Magazine, Special issue on computer security. vol. 2(4). ACM, New York (1996)
Verbauwhede, I., Hoornaert, F., Vandewalle, J., Man, H.D.: Security and performance optimization of a new DES data encryption chip. IEEE J. Solid-State Circuits 32, 647–656 (1988)
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR Cryptology ePrint Archive (2007). http://eprint.iacr.org/2007/413
Wang, M.: Differential cryptanalysis of reduced-round PRESENT. In: Progress in Cryptology - AFRICACRYPT 2008. Lecture Notes in Computer Science, vol. 5023, pp. 40–49. Springer, Berlin (2008)
Yalla, P., Kaps, J.: Lightweight cryptography for FPGAs. In: Proceedings of IEEE International Conference on ReConFigurable Computing and FPGAs, ReConFig ’09 (2009)
Z’aba, M., Raddum, H., Henricksen, M., Dawson, E.: Bit-pattern based integral attack. In: Fast Software Encryption. Lecture Notes in Computer Science, vol. 5086, pp. 363–381. Springer, Berlin (2008)
Zhang, H., Wang, X.: Cryptanalysis of stream cipher grain family. IACR Cryptology ePrint Archive (2009). http://eprint.iacr.org/
Zhang, K., Ding, L., Gua, J.: Cryptanalysis of hummingbird-2. IACR Cryptology ePrint Archive (2012). http://eprint.iacr.org/2012/207
Zhao, X., Wang, T., Guo, S.: Improved side channel cube attacks on PRESENT. IACR Cryptology ePrint Archive (2011). http://eprint.iacr.org/2011/165
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M. (2017). Cryptography in RFID Systems. In: RFID Security. Analog Circuits and Signal Processing. Springer, Cham. https://doi.org/10.1007/978-3-319-47545-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-47545-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47544-8
Online ISBN: 978-3-319-47545-5
eBook Packages: EngineeringEngineering (R0)