Security Implementation Using Present-Puffin Protocol

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

Reliable Data Processor in VLSI
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Give qualifications of instructors: DAP
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
The Advanced Encryption Standard (AES) Simplified.
CS 151 Digital Systems Design Lecture 37 Register Transfer Level
AES clear a replacement for DES was needed
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
VHDL AES 128 Encryption/Decryption
Lecture 13 Message Signing
Lecture 23 Symmetric Encryption
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 23 Symmetric Encryption
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
Final Presentation Encryption on Embedded System Supervisor: Ina Rivkin students: Chen Ponchek Liel Shoshan Spring 2014 Part B.
Block Cipher- introduction
Lecture 5B Block Diagrams HASH Example.
Encryption / Decryption on FPGA Final Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
ECE 448 Lecture 6 Finite State Machines State Diagrams vs. Algorithmic State Machine (ASM) Charts.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
CS480 Cryptography and Information Security
16-bit barrel shifter A Mini Project Report
FileCrypter Developed by: Under the Guidance Ms.S.Maheswari, M.C.A.
Basic Computer Organization and Design
Provides Confidentiality
Triple DES.
School of Computer Science and Engineering Pusan National University
6b. Practical Constructions of Symmetric-Key Primitives.
Data Encryption Standard
Unit -1.
ECE 448 Lecture 6 Finite State Machines State Diagrams vs. Algorithmic State Machine (ASM) Charts.
Symmetric Key Block Ciphers
Implementation of IDEA on a Reconfigurable Computer
IEEE i Dohwan Kim.
PART VII Security.
Security in Network Communications
Lesson 4 Synchronous Design Architectures: Data Path and High-level Synthesis (part two) Sept EE37E Adv. Digital Electronics.
Some of this slide set is from Section 2,
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
SOFTWARE IMPLEMENTATION OF OCB MODE
Chapter -2 Block Ciphers and the Data Encryption Standard
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Block Ciphers: DES and AES
An Improved Novel Key Management Protocol for RFID Systems
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
ECE 448 Lecture 6 Finite State Machines State Diagrams, State Tables, Algorithmic State Machine (ASM) Charts, and VHDL Code.
International Data Encryption Algorithm
RTL Design Methodology Transition from Pseudocode & Interface
ECE 448 Lecture 6 Finite State Machines State Diagrams, State Tables, Algorithmic State Machine (ASM) Charts, and VHDL code ECE 448 – FPGA and ASIC Design.
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DATA ENCRYPTION STANDARD (DES)
ECE 448 Lecture 6 Finite State Machines State Diagrams vs. Algorithmic State Machine (ASM) Charts.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Advanced Encryption Standard
Feistel Cipher Structure
Presentation transcript:

Security Implementation Using Present-Puffin Protocol Rania Baashirah, Anusha Kommareddy, Sumanth Kumar Batchu, Vinusha Sunku, Rithvik Sai Ginjupalli, and Shakour Abuzneid Department of Computer Science & Engineering University of Bridgeport, Bridgeport, CT Abstract Representation & Abstraction Present-Puffin: The lightweight cipher PUFFIN was introduced and upgraded to PUFFIN2. Both ciphers are 64-bit SPN ciphers with round functions composed of a key addition, an S-box layer and a permutation. The main intention of this cipher permutation and the substitution layer are used for both  encryption and decryption process. The first number of key bits in PUFFIN was 128, it has been reduced to 80 in PUFFIN2 while the number of rounds has been increased from 32 to 34. that in addition to the 32 rounds of PUFFIN, a sub-key addition and a permutation are performed at the beginning. In PUFFIN2, the S-box layer has 34-bits. The Electronic Product Code Generation 2 (EPC GEN2) protocol does not have any technique to authenticate the Reader before it gives access to the Tag’s memory. In this paper, we use security implementation and mutual authentication between tag and reader of three different lightweight ciphers. We used Hummingbird (HB), PRESENT, and Extended Tiny Encryption Algorithm (XTEA) to encrypt the data and implemented all three algorithms to FPGA devices. We finally implemented PRESENT with PUFFIN as a trail and we got better results compared to the former three ciphers based on performance, data blocks and execution time. A digital system can be represented at different levels of abstraction. This keeps the description and design of complex systems management. The highest level of abstraction is the behavioral level that describes a system regarding what it does (or how it behaves) rather than regarding its components and interconnection between them. A behavioral description specifies the relationship between the input and output signals. This could be a Boolean expression or a more abstract description such as the Register Transfer or Algorithmic level. Implementation RFID Components Software Used: Xilinx ISE 14.5/13.2   Hardware that can be implemented: FPG Spartan Applications: VLSI Permutations protocols Antenna RF front end Physical layer Tag identification layer The physical layer comprises of encoding and decoding of the bits from the decoder. Tag Identification layer gets the input from the physical decoder. Tag ID layer mostly depends on the FSM through it has many entities like slot counter, CRC, and random number generator. Tag ID plays the significant role in maintaining the security. As the tag ID performs more function, hence, it would use more hardware using VHDL. Encryption Algorithms Analysis & Results Advanced Encryption Standard: It is adopted by US government which is based Upon the 128-bit block size and has different key sizes as 128,192 and 256 bits which are resembling 10,12 and 24 round transformation. Operations performed in AES are as ADD ROUND KEY which is a bit XOR operation for block text, we use a S-box for substitution of block shift rows and mix columns are used for shift operations. However, it uses more hardware resources. XTEA Algorithms: It is a block cipher based on Feistel structure. It consists of 64-bit plain text and 64-bit cipher text where it consists of 128-bit key operation. It performs 32 round iterations. Humming Bird: It is a lightweight protocol and also a rotor based encryption. It has 16 bit plain text and 16 bit cipher text which has 256 bit key. Input keys are been given as input to the four rotors. The output to the rotor is the cipher text. They use different keys in different steps of rotors and in each step the it gets different vector. Compared to the previous implementations of RFID protocols this implementation using present with puffin protocol is observed to be having better results and this also can be further improved. Conclusion Tag-Reader Interaction: Inventory Rounds Accordingly, as per the comparison of the algorithms our algorithm(present with puffin) is of Low cost solution for many applications where privacy and security has been a major threat. It has Small area , low power requirements and less clock cycles compared to other algorithms. However, PRESENT consumes fewer hardware resources and is faster when compared to HB and XTEA, and is thus more suitable for RFID technology. Ready Arbitrate Reply Acknowledged Open Secured Killed