期刊文献+

一种面向RFID的超轻量级流密码算法

An Ultra-lightweight Stream Cipher Algorithm for RFID
下载PDF
导出
摘要 针对无线射频识别(RFID)系统安全性较低的问题,提出一种适用于RFID标签的超轻量级流密码算法Willow。根据正差集性质选取函数抽头,以增加猜测确定攻击的复杂度。采用动态初始化方式并使用位数较小的计数器进行密钥索引和初始化,从而降低算法的电路面积和功耗。在Design Compiler上进行对比实验,结果表明,与Grain-v1、Plantlet等算法相比,Willow算法的延迟和功耗均较低,其在硬件性能和安全性上取得了较好的折中。 To address the low security of Radio Frequency Identification(RFID)system,an ultra-lightweight stream cipher algorithm Willow for RFID tags is proposed.Function taps are selected according to the property of positive difference set to increase the complexity of guess-and-determine attack.In order to reduce the circuit area and power consumption of the algorithm,a dynamic initialization method is adopted,and a counter with a smaller number of digits is used for key indexing and initialization.A comparative experiment is carried out on Design Compiler,and results show that the delay and power consumption of Willow algorithm are lower than those of Grain-v1 and Plantlet algorithm,and it achieves a good balance between hardware performance and security.
作者 夏文涛 潘森杉 王良民 XIA Wentao;PAN Senshan;WANG Liangmin(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第10期144-149,共6页 Computer Engineering
基金 国家自然科学基金青年基金(61702230)
关键词 超轻量级流密码 无线射频识别 动态初始化 硬件实现 时间存储数据折中攻击 ultra-lightweight stream cipher Radio Frequency Identification(RFID) dynamic initialization hardware implementation time-memory-data tradeoff attack
  • 相关文献

参考文献3

二级参考文献18

  • 1ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST- 2002-507932[EB/OL]. (2004-02-11). http://www.ecrypt.eu. org/stream.
  • 2European Union. European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryp- tion[EB/OL]. (2002-03-16). http://www.cosic.esat.kuleuven. be/nessie.
  • 3Biryukov A. The Design of a Stream Cipher LEX[C]// Proceedings of the 13th International Conference on Selected Areas in Cryptography. Berlin, Germany: ACM Press, 2007: 67-75.
  • 4Velichkov V, Rijmen V, Preneel B. Algebraic Cryptanalysis of a Small-scale Version of Stream Cipher LEX[J]. Information Security, 2010, 4(2): 49-61.
  • 5Wu Hongjun, Preneel B. Resynchronization Attacks on WG and LEX[C]//Proceedings of the 13th International Conference on Fast Software Encryption. Berlin, Germany: Springer- Verlag, 2006: 422-432.
  • 6张中亚,关杰.对流密码算法LEX的差分故障攻击[J].上海交通大学学报:自然版,2012,46(6):865-869.
  • 7Bouillaguet C, Derbez P, Dunkelman O. Low Data Complexity attacks on AES[J]. IEEE Transactions on Information Theory, 2012, 58(11): 7002-7017.
  • 8Dunkelman O, Keller N. A New Attack on the LEX Stream Cipher[C]//Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Germany: Springer-Verlag, 2008: 539-556.
  • 9Dunkelman O. Cryptanalysis of the Stream Cipher LEX[J]. Designs, Codes and Cryptography, 2013, 67(3): 257-273.
  • 10Mainack M, Avik C, Nilanjia D. TweLEX: A Tweaked Versionof the LEX Stream Cipher[EB/OL]. (2011-05-19). http://eprint. iacr.org/2011/586.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部