A Novel Authenticated Encryption Algorithm for RFID Systems

Author(s):  
Zahra Jeddi ◽  
Esmaeil Amini ◽  
Magdy Bayoumi
2014 ◽  
Vol 8 ◽  
pp. 6257-6266
Author(s):  
Il-Soo Jeon ◽  
Myung-Sik Kim ◽  
Eun-Jun Yoon

2016 ◽  
Vol 9 (18) ◽  
pp. 5581-5590 ◽  
Author(s):  
Samad Rostampour ◽  
Nasour Bagheri ◽  
Mehdi Hosseinzadeh ◽  
Ahmad Khademzadeh

Author(s):  
Christoph Dobraunig ◽  
Maria Eichlseder ◽  
Stefan Mangard ◽  
Florian Mendel ◽  
Bart Mennink ◽  
...  

We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault attacks. This design is an improved version of the previously published Isap v1.0, and offers increased protection against implementation attacks as well as more efficient implementations. Isap v2.0 is a candidate in NIST’s LightWeight Cryptography (LWC) project, which aims to identify and standardize authenticated ciphers that are well-suited for applications in constrained environments. We provide a self-contained specification of the new Isap v2.0 mode and discuss its design rationale. We formally prove the security of the Isap v2.0 mode in the leakage-resilient setting. Finally, in an extensive implementation overview, we show that Isap v2.0 can be implemented securely with very low area requirements. https://isap.iaik.tugraz.at


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 48543-48556 ◽  
Author(s):  
Syed Jahanzeb Hussain Pirzada ◽  
Abid Murtaza ◽  
Tongge Xu ◽  
Liu Jianwei

2012 ◽  
Vol 532-533 ◽  
pp. 1695-1699
Author(s):  
Ai Ping Deng ◽  
Ben Xiao

It urgently needs to solve the information security issues of RFID system at present. In order to increase the security of RFID Secure Mechanism without affecting the operation efficiency, a novel chaotic encryption scheme is proposed to improve the RFID information security in RFID. The Logistic map with variable initial value is used to generate chaotic cipher sequence, and then the sequence is encrypted. Related analysis and simulation experiment verified that this chaotic encryption RFID Secure Mechanism is easily to realize. It shows that the novel chaotic encryption can completely meet the security demand of the RFID systems effectively.


2018 ◽  
Vol 10 (6) ◽  
pp. 185-189
Author(s):  
Ayman Y. El-Hadary ◽  
◽  
Mohamed Helmy Megahed ◽  
Mohamed H. Abd ElAzeem

Sign in / Sign up

Export Citation Format

Share Document