Browse > Article
http://dx.doi.org/10.3837/tiis.2010.04.002

Lightweight Cryptography and RFID: Tackling the Hidden Overhead  

Poschmann, Axel (Division of Mathematical Sciences, Nanyang Technological University)
Robshaw, Matthew J.B. (Orange Labs, 38-40 rue du General Leclerc, Issy les Moulineaux)
Vater, Frank (Innovations for High Performance Microelectronics)
Paar, Christof (Horst Gortz Institute for IT Security, Ruhr University Bochum)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.4, no.2, 2010 , pp. 98-116 More about this Journal
Abstract
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implementation there can be significant hidden overheads. In this paper we consider the case of cryptoGPS and we outline a full implementation that has been fabricated in ASIC. Interestingly, the implementation requirements still remain within the typically-cited limits for on-the-tag cryptography.
Keywords
Lightweight cryptography; RFID; cryptoGPS; ASIC;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 2
연도 인용수 순위
  • Reference
1 C. de Canniere and B. Preneel. "Trivium," Lecture Notes in Computer Science, vol.4986, pp.244-266, 2008.
2 M. Hell, T. Johansson, and W. Meier, "The Grain Family of Stream Ciphers, Lecture Notes in Computer Science, vol.4986, pp.179-190, 2008.
3 National Institute of Standards and Technology, "SP800-38A: Recommendation for Block Cipher Modes of Operation," 2001.
4 Atmel Corporation. Datasheet of ATMega32a, 2003. http://atmel.com/dyn/resources/prod_documents/doc8155.pdf.
5 Mentor Graphics Corporation. ModelSim SE User's Manual. http://www.model.com/resources/resources_manuals.asp.
6 Synopsys. Design compiler user guide - version a-2007.12. https://solvnet.synopsys.com/dow_retrieve/A-2007.12/dcug/dcug.html, December 2007.
7 ISO/IEC 9798 Information technology–Security techniques–Entity authentication–Part 5: Mechanisms using Zero-Knowledge Techniques. http://www.iso.org/iso/iso_catalogue/catalogue_ tc /catalogue_detail.htm?csnumber=39720.
8 IST-1999-12324, Final Report of European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryption (NESSIE), April 2004. http://www.cosic.esat.kuleuven.be/nessie.
9 M. Girault, L. Juniot, and M. Robshaw, "The Feasibility of On-the-Tag Public Key Cryptography," in Proc.of on RFID Security, 2007.
10 A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, "Handbook of Applied Cryptography," CRC Press, 1996.
11 M. Girault, "Low-Size Coupons for Low-Cost IC Cards," in Proc. of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp.39-50, 2001.
12 M. Girault and J. Stern, "On the Length of Cryptographic Hash-Values Used in Identification Schemes," Lecture Notes in Computer Science, vol.893, pp.202-215, 1994.
13 M. Girault and D. Lefranc, "Public Key Authentication with One (Online) Single Addition," Lecture Notes in Computer Science, vol.3156, pp.967-984, 2004.
14 J. Hoffstein, J. Pipher, and J. Silverman," NTRU: A Ring-based Public Key Cryptosystem," Lecture Notes in Computer Science, vol.1423, pp.267-288, 1998.
15 T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, "A Survey of Lightweight Cryptography Implementations," IEEE Design & Test of Computers, vol.24, no.6, pp.522-533, 2007.   DOI
16 F. Fürbass and J. Wolkerstorfer, "ECC Processor with Low Die Size for RFID Applications," in Proc. of The IEEE International Symposium on Circuits and Systems 2007, pp.1835-1838, 2007.
17 G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public key cryptography in sensor networks - revisited. in C. Castellucia, H. Hartenstein," Lecture Notes in Computer Science, vol.3312 , pp.2-18, 2004.
18 NTRU Corporation, NTRUencrypt. http://www.ntru.com.
19 Y. Oren and M. Feldhofer, "WIPR – public-key identification on two grains of sand," 2008. http://iss.oy.ne.ro/WIPR.
20 J. Wu and D. Stinson, "How to Improve Security and Reduce Hardware Demands of the WIPR RFID Protocol," in Proc.of Int IEEE Conf.on RFID, 2009.
21 M. Girault. Self-certified public keys. In D. W. Davies, "Advances in Cryptology," Lecture Notes in Computer Science, vol.547, pp.490-497, 1991.
22 M. Girault, G. Poupard, and J. Stern, "On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order," Journal of Cryptology, vol.19, pp.463-487, 2006.   DOI   ScienceOn
23 M. McLoone and M. J. B. Robshaw, "Public Key Cryptography and RFID," Lecture Notes in Computer Science, vol.4377, pp.372-384, 2007.
24 G. Poupard and J. Stern, "Security Analysis of a Practical on the fly Authentication and Signature Generation," Lecture Notes in Computer Science, vol.1403, pp.422-436, 1998
25 R. B. Handfield and E. L. Nichols, "Introduction to Supply Chain Management," Prentice-Hall, 1999.
26 A. Bogdanov, G. Leander, L.R. Knudsen, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, "An Ultra-Lightweight Block Cipher." Lecture Notes in Computer Science, vol.4727, pp. 450-466, 2007.
27 M. McLoone and M. J. B. Robshaw, "New Architectures for Low-Cost Public Key Cryptography on RFID Tags," in Proc.of Int IEEE Conf. on Security and Privacy of Emerging Areas in Communication Networks , pp.1827-1830, 2007.
28 M. Feldhofer, J. Wolkerstorfer and V. Rijmen, "AES Implementation on a Grain of Sand. Information Security," IEE Proceedings on Information Security, vol.152, no.1, pp.13-20, 2005.   DOI
29 L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An elliptic curve processor suitable for RFID-tags," Cryptology ePrint Archive - Report 2006/227, 2006. http://eprint .iacr.org/.
30 Dolphin Integration, "Sesame-lp2 – description of the standard cells for the process IHP 0.25 ${\mu}m$ - vic Specifications," 2005.
31 B. Parhami, "Computer Arithmetic: Algorithms and Hardware Designs," Oxford University Press, 1999.
32 FILRFID. Airbus chooses MainTag to Enable RFID in the A350, 2010. http://www.filrfid.org.