Skip to main content
Top

2017 | OriginalPaper | Chapter

6. RBS Performance Evaluation

Authors : Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi

Published in: RFID Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter presents a comprehensive evaluation of the proposed RBS cryptosystem and compares its performance against the performance of existing lightweight ciphers. An extensive set of simulation experiments is performed to show that the RBS cryptosystem requires less power and area compared to other known symmetric algorithms proposed for RFID systems especially when authentication is required. Such saving in the area overhead has a direct effect on the implementation cost of RFID tags which is another main practical concern. Our experiments also examine other performance metrics such as the energy-per-bit, the hardware efficiency, the area-time product and the power-area-time product. Simulation results demonstrate RBS superiority compared to existing algorithms. The chapter shows that the RBS algorithm is a promising candidate for providing strong resilience to several RFID security attacks—despite the severe resource constraints of passive RFID tags.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin (2007) Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol. 4727, pp. 450–466. Springer, Berlin (2007)
2.
go back to reference Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Cryptographic Hardware and Embedded Systems - CHES 2008. Lecture Notes in Computer Science, vol. 5154, pp. 283–299. Springer, Berlin (2008) Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Cryptographic Hardware and Embedded Systems - CHES 2008. Lecture Notes in Computer Science, vol. 5154, pp. 283–299. Springer, Berlin (2008)
3.
go back to reference Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011) Engels, D., Saarinen, M., Smith, E.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of Workshop on RFID Security (RFIDSec) (2011)
4.
go back to reference Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, vol. 4277, pp. 372–381. Springer, Berlin (2006) Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Lecture Notes in Computer Science, vol. 4277, pp. 372–381. Springer, Berlin (2006)
5.
go back to reference Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: State of the Artof Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191–204 (2007) Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: State of the Artof Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191–204 (2007)
6.
go back to reference Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD ’06 (2006) Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD ’06 (2006)
7.
go back to reference Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2 (1), 86–93 (2007)CrossRef Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2 (1), 86–93 (2007)CrossRef
8.
go back to reference Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 293–308. Springer, Berlin (2005) Juels, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 293–308. Springer, Berlin (2005)
9.
go back to reference Kaps, J.P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 4097, pp. 372–381. Springer, Berlin (2006) Kaps, J.P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science, vol. 4097, pp. 372–381. Springer, Berlin (2006)
10.
go back to reference Satoh, A., Inoue, T.: ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. In: Proceedings of International Conference on Information Technology: Coding and Computing (ITCC) (2005) Satoh, A., Inoue, T.: ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. In: Proceedings of International Conference on Information Technology: Coding and Computing (ITCC) (2005)
11.
go back to reference Zhilyaev, S.: Evaluating a new MAC for current and next generation RFID. Master thesis, University of Massachusetts - Amherst (2010) Zhilyaev, S.: Evaluating a new MAC for current and next generation RFID. Master thesis, University of Massachusetts - Amherst (2010)
Metadata
Title
RBS Performance Evaluation
Authors
Ahmed Khattab
Zahra Jeddi
Esmaeil Amini
Magdy Bayoumi
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-47545-5_6