The University of Adelaide Use of the Shrinking Generator in Lightweight Cryptography for RFID
نویسندگان
چکیده
RFID tags have severe constraints in computing power and hence offer particular challenges in the provision of e-Security. Whatever is chosen to provide security in an RFID tag should have low computational overhead. New approaches, differing from the traditional cryptosystems based on RSA, Diffie-Hellman, et al. are required. The use of one time codes is particularly appropriate as they guarantee perfect security and offer simple implementation. Research, experimentation, and field deployment in RFID has been done using different types of algorithms including bit shift, xor operations, pseudorandom bit generators including linear feedback shift registers (LFSR). There are many different types of pseudorandom bit generators. Some use RSA, or discrete logarithm like arithmetic, but use the last bit of the generated sequence as the random bit. These are infeasible in RFID and other lightweight devices due to high computational loads arising from the complex arithmetic operations. Another approach to the generation of random sequences is to use a combination of LFSRs. These are used in portable devices such as the GSM mobile phones. They have lightweight computational loads, but are susceptible to attacks. Of the many ingenuous combinations of LFSRs, the Shrinking Generator, designed in 1993, seems to have withstood the challenges of attacks if the polynomial connection structure and the internal seeds are kept secret.
منابع مشابه
Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملThe Tag Authentication Scheme using Self-Shrinking Generator on RFID System
Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today’s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary ...
متن کاملBit-oriented Generators for Wireless Sensor Networks and Low Cost Rfid Transponders
Wireless Sensor Network (WSN) nodes and passive RFID transponders (tags) have severe constraints in computing power and hence offer particular challenges in the provision of e-Security. Passive RFID tags are at the lowest end of the spectrum in the family of devices with constrained computing power and memory. New approaches, differing from the traditional cryptosystems such as RSA or Diffie-He...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007