Skip to main content

RBS Cryptosystem

  • Chapter
  • First Online:
RFID Security

Part of the book series: Analog Circuits and Signal Processing ((ACSP))

  • 1675 Accesses

Abstract

Redundant Bit Security (RBS) is a lightweight symmetric encryption algorithm that targets the resource-constrained RFID devices. Unlike its existing counterparts, RBS simultaneously provide confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext-data. Using a flexible-length hash algorithm in the RBS hardware implementation allows RBS to support different key sizes which implies flexibility in the security level. RBS hardware implementation consists of two parts. The first part implements the redundant bit generator by implementing a modified version of MAC generator that is compatible with block ciphers instead of the original MAC generator designed for stream ciphers. The second part of the RBS implementation targets implementing the encryption/decryption process. The encryption/decryption process is integrated with the transmission and reception modules of the RFID transponder. The RBS implementation presented supports online key size selection. This implies that the number of redundant bits, and accordingly the security level, in RBS is adjustable without changing the underlying hardware. This feature allows tags with the same hardware to operate with different key sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agren, M., Hell, M., Johansson, T.: On hardware-oriented message authentication with applications towards RFID. In: Proceedings of International Workshop on Lightweight Security & Privacy (LightSec) (2011)

    Google Scholar 

  2. Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wire. Mob. Comput. 5 (1), 48–59 (2011)

    Article  Google Scholar 

  3. Black, J., Rogaway, P.: CBC MACs for arbitrary-length messages: the three-key constructions. In: Advances in Cryptology - CRYPTO 2000. Lecture Notes in Computer Science, vol. 1880, pp. 197–215. Springer, Berlin, Heidelberg (2000)

    Google Scholar 

  4. Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin, Heidelberg (2007)

    Google Scholar 

  5. Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011)

    Google Scholar 

  6. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  7. Nguyen, L.H., Roscoe, A.W.: New combinatorial bounds for universal hash functions. IACR Cryptology ePrint Archive (2009). http://eprint.iacr.org/2009/153

    Google Scholar 

  8. Yuksel, K., Kaps, J., Sunar, B.: Universal hash functions for emerging ultra-low-power networks. In: Proceedings of CNDS (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M. (2017). RBS Cryptosystem. In: RFID Security. Analog Circuits and Signal Processing. Springer, Cham. https://doi.org/10.1007/978-3-319-47545-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47545-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47544-8

  • Online ISBN: 978-3-319-47545-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics