scispace - formally typeset
Open AccessBook ChapterDOI

Hash Functions and RFID Tags: Mind the Gap

TLDR
In this paper, the authors consider the options available, including constructions based around compact block ciphers, and highlight the difficulties in designing lightweight hash functions and urge caution when routinely appealing to a hash function in an RFID-tag protocol.
Abstract
The security challenges posed by RFID-tag deployments are well-known. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructions based around compact block ciphers. While we describe the most compact hash functions available today, our work serves to highlight the difficulties in designing lightweight hash functions and (echoing [17]) we urge caution when routinely appealing to a hash function in an RFID-tag protocol.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

The Internet of Things vision: Key features, applications and open issues

TL;DR: This paper presents the key features and the driver technologies of IoT, and identifies the application scenarios and the correspondent potential applications, and focuses on research challenges and open issues to be faced for the IoT realization in the real world.
Book ChapterDOI

The PHOTON family of lightweight Hash functions

TL;DR: The PHOTON lightweight hash function as mentioned in this paper uses a sponge-like construction as domain extension algorithm and an AES-like primitive as internal unkeyed permutation to obtain the most compact hash function known, reaching areas very close to the theoretical optimum.
Journal ArticleDOI

A roadmap for security challenges in the Internet of Things

TL;DR: According to the novel taxonomy of IoT framework, different research challenges will be highlighted, important solutions and research activities will be exposed, and interesting research directions will be proposed to ensure security of IoT components and applications.
Book ChapterDOI

SPONGENT: a lightweight hash function

TL;DR: Spongent is a family of lightweight hash functions with hash sizes of 88, 128, 160, 224, and 256 bits based on a sponge construction instantiated with a present-type permutation, following the hermetic sponge strategy.
Book ChapterDOI

KLEIN: a new family of lightweight block ciphers

TL;DR: A new family of lightweight block ciphers named KLEIN is described, which is designed for resource-constrained devices such as wireless sensors and RFID tags, and has advantage in the software performance on legacy sensor platforms, while its hardware implementation can be compact as well.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book ChapterDOI

PRESENT: An Ultra-Lightweight Block Cipher

TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Related Papers (5)