Logo des Repositoriums
 
Konferenzbeitrag

Hardware efficient authentication based on random selection

Lade...
Vorschaubild

Volltext URI

Dokumententyp

Text/Conference Paper

Zusatzinformation

Datum

2014

Zeitschriftentitel

ISSN der Zeitschrift

Bandtitel

Verlag

Gesellschaft für Informatik e.V.

Zusammenfassung

Lightweight authentication protocols based on random selection were introduced as an alternative design paradigm besides the usage of lightweight block ciphers and the principle of adding based noise. However a comparatively large key length and the use of involved operations made a hardware-efficient implementation a challenging task. In this work we introduce the (n, k, L)80-protocol, a variant of linear authentication protocols which overcomes these problems, and analyze its security against all currently known, relevant passive and active attacks. Moreover, we present an implementation of our protocol for FPGAs and ASICs using Verilog and discuss its efficiency w.r.t. generally accepted costs metrics. The respective numbers show that the (n, k, L)80-protocol is a viable alternative to existing solutions and is, for example, well suited for the implementation on passive RFID tags.

Beschreibung

Armknecht, Frederik; Hamann, Matthias; Krause, Matthias (2014): Hardware efficient authentication based on random selection. Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 978-3-88579-622-0. pp. 169-185. Regular Research Papers. Wien, Österreich. 19.-21. März 2014

Schlagwörter

Zitierform

DOI

Tags