Side channel analysis of SPECK

2020 ◽  
Vol 28 (6) ◽  
pp. 655-676
Author(s):  
Mabin Joseph ◽  
Gautham Sekar ◽  
R. Balasubramanian

SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits. SPECK has been standardised by ISO/IEC for radio frequency identification (RFID) devices. It has drawn the attention of many cryptanalysts and several cryptanalysis results have been published. In this paper, carry flag attacks on the full SPECK ciphers are presented. Depending on the key size and block size, the complexities of our attacks, to nearly ensure success, vary from 2 59 time and 2 14 data to 2 227 time and 2 62 data.

Author(s):  
Narges Kasiri ◽  
G. Scott Erickson ◽  
Gerd Wolfram

Radio frequency identification (RFID) has been viewed as a promising technology for quite some time. Initially developed a couple of decades ago, the technology has been accompanied by predictions of imminent widespread adoption since its beginnings. A majority of retailers and other users are now using or planning to use the technology. This paper employs a combination of the technology-organization-environment (TOE) model and the 3-S (substitution, scale, structural) model to analyze the long journey of RFID adoption in retail. Top retail executives in the US and Europe were interviewed to investigate RFID adoption patterns based on differences in technological, organizational, and environmental circumstances. As the retail industry is moving into a post-adoption era, these results demonstrate the current stage of retail RFID adoption, identify factors playing important roles over time as motivators or impediments, and provide some insight into the slow pace of adoption.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2021 ◽  
pp. C1-C1
Author(s):  
Meziane Hamoudi ◽  
Amina Bel Korchi ◽  
Sylvain Guilley ◽  
Sofiane Takarabt ◽  
Khaled Karray ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document