scispace - formally typeset
Book ChapterDOI

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol

Reads0
Chats0
TLDR
Gossamer is presented, a new protocol inspired by the recently published SASI scheme that is designed to avoid the problems of the past and is examined in some deep its security and performance.
Abstract
The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative. This paper analyses the most important proposals (except for those based in hard problems such as the HB [1-3] family) in the area [4-6] and identifies the common weaknesses that have left all of them open to various attacks [7-11]. Finally, we present Gossamer, a new protocol inspired by the recently published SASI scheme [13], that was lately also the subject of a disclosure attack by Hernandez-Castro et al.[14]. Specifically, this new protocol is designed to avoid the problems of the past, and we examine in some deep its security and performance.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

TL;DR: This work has proposed an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost and thus the computation overhead is very low.
Journal ArticleDOI

A New Ultralightweight RFID Authentication Protocol with Permutation

TL;DR: Security analysis shows that RAPP achieves the functionalities of the authentication protocol and is resistant to various attacks, and performance evaluation illustrates that R APP uses fewer resources on tags in terms of computation operation, storage requirement and communication cost.
Journal ArticleDOI

Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G

TL;DR: The LRMAPC can greatly reduce the computational and transmission cost and can reduce computational costs greatly when a large number of tags want to be authenticated, and it is proved the correctness of L RMAPC using GNY logic.
Journal ArticleDOI

On Ultralightweight RFID Authentication Protocols

TL;DR: The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques.
BookDOI

Radio Frequency Identification

TL;DR: While RFID systems primarily deal with automating identity management, they are frequently deployed in combination with Geographic Information Systems to yield even more powerful solutions that track both identity and spatial location.
References
More filters
Book ChapterDOI

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Journal Article

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Book

Fast Software Encryption

TL;DR: Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.
Journal ArticleDOI

Grain: a stream cipher for constrained environments

TL;DR: A new stream cipher, Grain, is proposed, which targets hardware environments where gate count, power consumption and memory is very limited and has the additional feature that the speed can be increased at the expense of extra hardware.
Journal ArticleDOI

SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

TL;DR: A new ultralightweight RFID authentication protocol is proposed that provides strong authentication and strong integrity protection of its transmission and of updated data and can resist all the possible attacks.
Related Papers (5)