Hash Functions and RFID Tags: Mind the Gap
Andrey Bogdanov,Gregor Leander,Christof Paar,Axel Poschmann,Matthew Robshaw,Yannick Seurin +5 more
- Vol. 5154, pp 283-299
TLDR
In this paper, the authors consider the options available, including constructions based around compact block ciphers, and highlight the difficulties in designing lightweight hash functions and urge caution when routinely appealing to a hash function in an RFID-tag protocol.Abstract:
The security challenges posed by RFID-tag deployments are well-known. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructions based around compact block ciphers. While we describe the most compact hash functions available today, our work serves to highlight the difficulties in designing lightweight hash functions and (echoing [17]) we urge caution when routinely appealing to a hash function in an RFID-tag protocol.read more
Citations
More filters
Journal ArticleDOI
The Internet of Things vision: Key features, applications and open issues
TL;DR: This paper presents the key features and the driver technologies of IoT, and identifies the application scenarios and the correspondent potential applications, and focuses on research challenges and open issues to be faced for the IoT realization in the real world.
Book ChapterDOI
The PHOTON family of lightweight Hash functions
TL;DR: The PHOTON lightweight hash function as mentioned in this paper uses a sponge-like construction as domain extension algorithm and an AES-like primitive as internal unkeyed permutation to obtain the most compact hash function known, reaching areas very close to the theoretical optimum.
Journal ArticleDOI
A roadmap for security challenges in the Internet of Things
TL;DR: According to the novel taxonomy of IoT framework, different research challenges will be highlighted, important solutions and research activities will be exposed, and interesting research directions will be proposed to ensure security of IoT components and applications.
Book ChapterDOI
SPONGENT: a lightweight hash function
TL;DR: Spongent is a family of lightweight hash functions with hash sizes of 88, 128, 160, 224, and 256 bits based on a sponge construction instantiated with a present-type permutation, following the hermetic sponge strategy.
Book ChapterDOI
KLEIN: a new family of lightweight block ciphers
TL;DR: A new family of lightweight block ciphers named KLEIN is described, which is designed for resource-constrained devices such as wireless sensors and RFID tags, and has advantage in the software performance on legacy sensor platforms, while its hardware implementation can be compact as well.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book ChapterDOI
PRESENT: An Ultra-Lightweight Block Cipher
Andrey Bogdanov,Lars R. Knudsen,Gregor Leander,Christof Paar,Axel Poschmann,Matthew Robshaw,Yannick Seurin,C. Vikkelsoe +7 more
TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.