An Ultra-Light PRNG for RFID Tags

  • Mehmet Hilal Özcanhan
  • Gökhan Dalkiliç
  • Mesut Can Gürle
Conference paper


This work presents a pseudo-random number generator for RFID tags. The proposed generator takes non-random seeds and produces output that passes popular randomness tests. The generator uses true random numbers extracted from a newly discovered property of the tag memories. Unlike previous work, the proposed scheme uses very little die area and clock, leaving space for other security applications as well. The scheme is inspired from a well founded pseudo random number generator, which has many variations for computer security applications. Even though it is simple and sequential, the proposed scheme’s performance equals similar previous work, even though others depend on random number inputs.


RFID Low cost tags Random numbers Randomness tests Ubiquitous 


  1. 1.
    Robert, C.M.: Radio frequency identification. Comput. Secur. 25, 18–26 (2006)CrossRefGoogle Scholar
  2. 2.
    Das, R., Havrop, P.: RFID forecasts, players and opportunities 2011–2021. IDTechEX (2010)Google Scholar
  3. 3.
    Lopez, P.P., Castro, J.C.H., Tapiador, J.E., Ribagorda, J.: LAMED a PRNG for EPC Class-1 Generation-2 RFID Spec. Comput. Stand. Interfaces 31(1), 88–97 (2009)CrossRefGoogle Scholar
  4. 4.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Proceedings of the 4th International Workshop on CHES. LNCS, vol. 2523, pp. 454–470 (2002)Google Scholar
  5. 5.
    Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. In: Transactions on Dependable and Secure Computing, vol. 4, pp. 337–340. IEEE (2007)Google Scholar
  6. 6.
  7. 7.
    Class-1 Generation 2 UHF Air Interface Protocol Standard "Gen-2", Version 1.2.0,
  8. 8.
    Martin, H., Millan, E.S., Entrena, L., Lopez, P.P., Castro, J.C.H.: AKARI-x: a pseudorandom number generator for secure lightweight systems. In: 17th IEEE IOLTS, pp. 228–233 (2011)Google Scholar
  9. 9.
    Jun, B., Kocher, P.: The Intel ®Random number generator. Cryptography Research, White Paper (1999)Google Scholar
  10. 10.
    Menenez, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, Chapter 5, pp. 169–190. CRC Press, Boca Raton (1996)Google Scholar
  11. 11.
    Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198–1210 (2009)Google Scholar
  12. 12.
    Che, W., Deng, H., Tan, X., Wang, J.: A random number generator for application in RFID tags. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, Chapter 16, pp. 279–287. Springer, Berlin (2008)Google Scholar
  13. 13.
    Segui, J.M., Alfaro, J.G., Joancomarti, J.H.: Analysis and improvement of a pseudorandom number generator for EPC Gen2 Tags. FC’10, LNCS, pp. 34–46. Springer-Verlag (2010)Google Scholar
  14. 14.
    Segui, J.M., Alfaro, J.G., Joancomarti, J.H.: A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags. Int. J. Wirel. Pers. Commun. 59(1), 27–42 (2011)CrossRefGoogle Scholar
  15. 15.
    Alomair, B., Lazos, L., Poovendran, R.: Passive attacks on a class of authentication protocols for RFID. In: ICISC’07, pp. 102–115 (2007)Google Scholar
  16. 16.
    Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)MATHCrossRefGoogle Scholar
  17. 17.
    Matsumoto, M., Nishimura, T., Hagita, M., Saito, M.: Cryptographic Mersenne Twister and Fubuki Stream/Block Cipher (2005)Google Scholar
  18. 18.
    Panneton, F., L’Ecuyer, P., Matsumoto, M.: Improved long-period generators based on linear recurrences modulo 2. ACM Trans. Math. Softw. 32(1), 1–16 (2006)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: LNCS, vol. 3156, pp. 357–370. Springer (2004)Google Scholar
  20. 20.
    Moradi, A., Poschmann, A.: Lightweight cryptography and DPA countermeasures: a survey. In: LNCS, vol. 6054, pp. 68–79. Springer (2010)Google Scholar
  21. 21.
    Paar, C., Poschmann, A., Robshaw, M.J.B.: New designs in lightweight symmetric encryption. In: RFID Security: Techniques, Protocols and System-on-Chip Design, vol. 3, pp. 349–371. Springer, Berlin (2009)Google Scholar
  22. 22.
    Lopez, P.P., Lim, P.T., Li, T.: Providing stronger authentication at a low-cost to RFID tags operating under the EPCglobal framework. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 159–167 (2008)Google Scholar
  23. 23.
    Feldhofer, M., Wolkerstorfer, J.: Hardware implementation of symmetric algorithms for RFID security. In: RFID Security: Techniques, Protocols and System-on-Chip Design, vol. 3, pp. 373–415. Springer (2009)Google Scholar
  24. 24.
    Walker, J.: Randomness battery. (1998)
  25. 25.
    Marsaglia, G.: The Marsaglia Random Number DIEHARD Battery of Tests of Randomness. ver1:, 1996, ver2: (2003)
  26. 26.
    Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. (2001)
  27. 27.
    Alani, M.M.: Testing randomness in ciphertext of block-ciphers using dieHard tests. Int. J. Comput. Sci. Netw. Secur. 10(4), 53–57 (2010)MathSciNetGoogle Scholar
  28. 28.
    Kohlbrenner, P., Gaj, K.: An embedded true random number generator for fpgas. In: Proceedings of the 12th FPGA 2004, ACM/SIGDA, pp. 71–78 (2004)Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Mehmet Hilal Özcanhan
    • 1
  • Gökhan Dalkiliç
    • 1
  • Mesut Can Gürle
    • 1
  1. 1.Faculty of EngineeringDokuz Eylül University IzmirTurkey

Personalised recommendations