Skip to main content

RBS Performance Evaluation

  • Chapter
  • First Online:
RFID Security

Part of the book series: Analog Circuits and Signal Processing ((ACSP))

  • 1668 Accesses

Abstract

This chapter presents a comprehensive evaluation of the proposed RBS cryptosystem and compares its performance against the performance of existing lightweight ciphers. An extensive set of simulation experiments is performed to show that the RBS cryptosystem requires less power and area compared to other known symmetric algorithms proposed for RFID systems especially when authentication is required. Such saving in the area overhead has a direct effect on the implementation cost of RFID tags which is another main practical concern. Our experiments also examine other performance metrics such as the energy-per-bit, the hardware efficiency, the area-time product and the power-area-time product. Simulation results demonstrate RBS superiority compared to existing algorithms. The chapter shows that the RBS algorithm is a promising candidate for providing strong resilience to several RFID security attacks—despite the severe resource constraints of passive RFID tags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin (2007)

    Google Scholar 

  2. Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Cryptographic Hardware and Embedded Systems - CHES 2008. Lecture Notes in Computer Science, vol. 5154, pp. 283–299. Springer, Berlin (2008)

    Google Scholar 

  3. Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011)

    Google Scholar 

  4. Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, vol. 4277, pp. 372–381. Springer, Berlin (2006)

    Google Scholar 

  5. Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: State of the Artof Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191–204 (2007)

    Google Scholar 

  6. Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD ’06 (2006)

    Google Scholar 

  7. Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2 (1), 86–93 (2007)

    Article  Google Scholar 

  8. Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 293–308. Springer, Berlin (2005)

    Google Scholar 

  9. Kaps, J.P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 4097, pp. 372–381. Springer, Berlin (2006)

    Google Scholar 

  10. Satoh, A., Inoue, T.: ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. In: Proceedings of International Conference on Information Technology: Coding and Computing (ITCC) (2005)

    Google Scholar 

  11. Zhilyaev, S.: Evaluating a new MAC for current and next generation RFID. Master thesis, University of Massachusetts - Amherst (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Khattab, A., Jeddi, Z., Amini, E., Bayoumi, M. (2017). RBS Performance Evaluation. In: RFID Security. Analog Circuits and Signal Processing. Springer, Cham. https://doi.org/10.1007/978-3-319-47545-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47545-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47544-8

  • Online ISBN: 978-3-319-47545-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics