Abstract
Redundant Bit Security (RBS) is a lightweight symmetric encryption algorithm that targets the resource-constrained RFID devices. Unlike its existing counterparts, RBS simultaneously provide confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext-data. Using a flexible-length hash algorithm in the RBS hardware implementation allows RBS to support different key sizes which implies flexibility in the security level. RBS hardware implementation consists of two parts. The first part implements the redundant bit generator by implementing a modified version of MAC generator that is compatible with block ciphers instead of the original MAC generator designed for stream ciphers. The second part of the RBS implementation targets implementing the encryption/decryption process. The encryption/decryption process is integrated with the transmission and reception modules of the RFID transponder. The RBS implementation presented supports online key size selection. This implies that the number of redundant bits, and accordingly the security level, in RBS is adjustable without changing the underlying hardware. This feature allows tags with the same hardware to operate with different key sizes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agren, M., Hell, M., Johansson, T.: On hardware-oriented message authentication with applications towards RFID. In: Proceedings of International Workshop on Lightweight Security & Privacy (LightSec) (2011)
Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wire. Mob. Comput. 5 (1), 48–59 (2011)
Black, J., Rogaway, P.: CBC MACs for arbitrary-length messages: the three-key constructions. In: Advances in Cryptology - CRYPTO 2000. Lecture Notes in Computer Science, vol. 1880, pp. 197–215. Springer, Berlin, Heidelberg (2000)
Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin, Heidelberg (2007)
Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Nguyen, L.H., Roscoe, A.W.: New combinatorial bounds for universal hash functions. IACR Cryptology ePrint Archive (2009). http://eprint.iacr.org/2009/153
Yuksel, K., Kaps, J., Sunar, B.: Universal hash functions for emerging ultra-low-power networks. In: Proceedings of CNDS (2004)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M. (2017). RBS Cryptosystem. In: RFID Security. Analog Circuits and Signal Processing. Springer, Cham. https://doi.org/10.1007/978-3-319-47545-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-47545-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47544-8
Online ISBN: 978-3-319-47545-5
eBook Packages: EngineeringEngineering (R0)