RSPAE: RFID Search Protocol based on Authenticated Encryption
Authors
Abstract:
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the security level, which can provide confidentiality and integrity, simultaneously. Furthermore, since the proposed protocol belongs to the lightweight protocols category, it is appropriate for applications that require many tags and costs must be low. In terms of the security, the analysis results give a satisfactory security level and it is robust against different RFID threats like replay, traceability and impersonation attacks. Using Ouafi-Phan model, BAN and AVISPA, we also checked the security correctness of the suggested protocol.
similar resources
Permutation-based encryption, authentication and authenticated encryption
While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...
full textAuthenticated On-Line Encryption
In this paper, we investigate the authenticated encryption paradigm, and its security against blockwise adaptive adversaries, mounting chosen ciphertext attacks on on-the-fly cryptographic devices. We remark that most of the existing solutions are insecure in this context, since they provide a decryption oracle for any ciphertext. We then propose a generic construction called Decrypt-Then-Mask,...
full textA Lightweight Authenticated Encryption Algorithm for RFID Systems
Security of RFID systems is a very important issue with the increasing of their applications. To achieve secure communications between a reader and a tag in RFID systems, encryption of the communication data is usually performed. However, in case of low-cost RFID tags, it is difficult for them to adopt the well-known encryption algorithms because the tags have very limited resources to implemen...
full textAuthenticated Streamwise On-line Encryption
In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the next input block is received. In this paper, we introduce Authenticated Streamwise Online Encryption (ASOE), which operates on plaintexts and ciphertexts as streams of arbitrary length (as opposed to fixed-sized blocks), and thus significantly reduces message expansion and end-to-end latency. Also, ...
full textAuthenticated Encryption
Often when two parties communicate over a network, they have two main security goals: privacy and authentication. In fact, there is compelling evidence that one should never use encryption without also providing authentication [8, 14]. Many solutions for the privacy and authentication problems have existed for decades, and the traditional approach to solving both simultaneously has been to comb...
full textRing Authenticated Encryption: A New Type of Authenticated Encryption
By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification-dependence and recipient-ambiguity. We also give...
full textMy Resources
Journal title
volume 6 issue 2
pages 179- 192
publication date 2018-11-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023