SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
نویسنده
چکیده
We describe a new function called SQUASH (which is short for SQU are-hASH ), which is ideally suited to challenge-response MAC applications in highly constrained devices such as RFID tags. It is exceptionally simple, requires no source of random bits, and can be efficiently implemented on processors with arbitrary word sizes. Unlike other ad-hoc proposals which have no security analysis, SQUASH is provably at least as secure as Rabin’s public key encryption scheme in this application.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Elliptic Curve Processor Suitable For RFID-Tags
RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of fire when their security and privacy is concerned. It is widely believed that devices with such cons...
متن کاملBit-oriented Generators for Wireless Sensor Networks and Low Cost Rfid Transponders
Wireless Sensor Network (WSN) nodes and passive RFID transponders (tags) have severe constraints in computing power and hence offer particular challenges in the provision of e-Security. Passive RFID tags are at the lowest end of the spectrum in the family of devices with constrained computing power and memory. New approaches, differing from the traditional cryptosystems such as RSA or Diffie-He...
متن کاملLIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 2 n, where n denotes the inner state length of the underlying keystream generator. In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. Its hardware efficiency results from combining a Grain-like desig...
متن کاملMinimalist Cryptography for Low-Cost RFID Tags
A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally w...
متن کامل