Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation

2017 ◽  
Vol 26 (09) ◽  
pp. 1750138 ◽  
Author(s):  
Zahra Jeddi ◽  
Ahmed Khattab ◽  
Esmaeil Amini ◽  
Madgy Bayoumi

This paper presents an analysis of the security performance and evaluation of the hardware architecture of the redundant bit security (RBS) cryptosystem. RBS is a lightweight symmetric encryption algorithm that targets resource-constrained RFID devices. Unlike the existing cryptosystems, RBS simultaneously provides confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext data. A flexible-length hash algorithm in our optimized hardware architecture allows RBS to support different key sizes which allows flexibility in the security level. Our analysis shows the resilience of RBS against powerful and well-known attacks such as differential attacks and known-plaintext attacks. We compare the performance of the RBS cryptosystem against other distinguished ciphers developed for RFID systems. Simulation results show that RBS results in approximately 100%, 239%, and 153% higher hardware efficiencies while requiring 48%, 56%, and 59% less energy-per-bit compared to H-PRESENT, HB-2, and Grain, respectively. Such results present confirmatory evidence that RBS is a superior solution for providing security in resource-constrained systems such as RFID systems especially when authentication is a priority.

2016 ◽  
Vol 75 ◽  
pp. 06005 ◽  
Author(s):  
Artem Yushev ◽  
Manuel Schappacher ◽  
Axel Sikora

2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


2019 ◽  
Vol 134 ◽  
pp. 106266 ◽  
Author(s):  
Stephen Adams ◽  
Ryan Meekins ◽  
Peter A. Beling ◽  
Kevin Farinholt ◽  
Nathan Brown ◽  
...  

Author(s):  
Norbert Druml ◽  
Manuel Menghin ◽  
Adnan Kuleta ◽  
Christian Steger ◽  
Reinhold Weiss ◽  
...  

2010 ◽  
Vol 6 (4) ◽  
pp. 610-620 ◽  
Author(s):  
Yifan Wu ◽  
Giorgio Buttazzo ◽  
Enrico Bini ◽  
Anton Cervin

Sign in / Sign up

Export Citation Format

Share Document