Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag

作者: Thomas Plos , Martin Feldhofer

DOI: 10.1007/978-3-642-31909-9_24

关键词: CryptographyProtocol (object-oriented programming)Computer hardwareClock rateFlexibility (engineering)Computer scienceNOEKEONIdentification (information)Symmetric-key algorithmMicrocontroller

摘要: Radio-frequency identification (RFID) technology is the enabler for future Internet of Things (IoT) where security will play an important role. In this work, we evaluate costs adding different security-layer variants that are based on symmetric cryptography to a low-cost RFID tag. contrast related do not only consider cryptographic-algorithm implementation, but also relate protocol handling layer. Further show using tag architecture low-resource 8-bit microcontroller highly advantageous. Such approach flexibility allows combining implementation and cryptographic algorithm microcontroller. Expensive resources like memory can be easily reused, lowering overall hardware costs. We have synthesized security-enabled 130 nm CMOS technology, algorithms AES NOEKEON demonstrate effectiveness our approach. Average power consumption 2 μ W at clock frequency 106 kHz. Hardware range from about 1100 GEs 4500 AES.

参考文章(9)
Thomas Plos, Hannes Groß, Martin Feldhofer, Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags international conference on selected areas in cryptography. pp. 114- 129 ,(2010) , 10.1007/978-3-642-19574-7_8
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
He Yan, Hu jianyun, Li Qiang, Min Hao, Design of low-power baseband-processor for RFID tag symposium on applications and the internet. ,vol. 6, pp. 60- 63 ,(2006) , 10.1109/SAINT-W.2006.15
Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang, Pushing the limits: a very compact and a threshold implementation of AES international cryptology conference. pp. 69- 88 ,(2011) , 10.1007/978-3-642-20465-4_6
M. Feldhofer, J. Wolkerstorfer, V. Rijmen, AES implementation on a grain of sand IEE Proceedings - Information Security. ,vol. 152, pp. 13- 20 ,(2005) , 10.1049/IP-IFS:20055006
Roger Frost, International Organization for Standardization (ISO) Quality Assurance Journal. ,vol. 8, pp. 198- 206 ,(2004) , 10.1002/QAJ.287
Jianping Wang, Huiyun Li, Fengqi Yu, Design of Secure and Low-Cost RFID Tag Baseband international conference on wireless communications, networking and mobile computing. pp. 2066- 2069 ,(2007) , 10.1109/WICOM.2007.516