Abstract
This chapter presents a comprehensive evaluation of the proposed RBS cryptosystem and compares its performance against the performance of existing lightweight ciphers. An extensive set of simulation experiments is performed to show that the RBS cryptosystem requires less power and area compared to other known symmetric algorithms proposed for RFID systems especially when authentication is required. Such saving in the area overhead has a direct effect on the implementation cost of RFID tags which is another main practical concern. Our experiments also examine other performance metrics such as the energy-per-bit, the hardware efficiency, the area-time product and the power-area-time product. Simulation results demonstrate RBS superiority compared to existing algorithms. The chapter shows that the RBS algorithm is a promising candidate for providing strong resilience to several RFID security attacks—despite the severe resource constraints of passive RFID tags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin (2007)
Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Cryptographic Hardware and Embedded Systems - CHES 2008. Lecture Notes in Computer Science, vol. 5154, pp. 283–299. Springer, Berlin (2008)
Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011)
Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, vol. 4277, pp. 372–381. Springer, Berlin (2006)
Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: State of the Artof Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191–204 (2007)
Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD ’06 (2006)
Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2 (1), 86–93 (2007)
Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 293–308. Springer, Berlin (2005)
Kaps, J.P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 4097, pp. 372–381. Springer, Berlin (2006)
Satoh, A., Inoue, T.: ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. In: Proceedings of International Conference on Information Technology: Coding and Computing (ITCC) (2005)
Zhilyaev, S.: Evaluating a new MAC for current and next generation RFID. Master thesis, University of Massachusetts - Amherst (2010)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M. (2017). RBS Performance Evaluation. In: RFID Security. Analog Circuits and Signal Processing. Springer, Cham. https://doi.org/10.1007/978-3-319-47545-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-47545-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47544-8
Online ISBN: 978-3-319-47545-5
eBook Packages: EngineeringEngineering (R0)