Gesellschaft für Informatik e.V.

Lecture Notes in Informatics


Sicherheit 2014 -- Sicherheit, Schutz und Zuverlässigkeit P-228, 169-185 (2014).

Gesellschaft für Informatik, Bonn
2014


Copyright © Gesellschaft für Informatik, Bonn

Contents

Hardware efficient authentication based on random selection

Frederik Armknecht , Matthias Hamann and Matthias Krause

Abstract


Lightweight authentication protocols based on random selection were introduced as an alternative design paradigm besides the usage of lightweight block ciphers and the principle of adding based noise. However a comparatively large key length and the use of involved operations made a hardware-efficient implementation a challenging task. In this work we introduce the (n, k, L)80-protocol, a variant of linear authentication protocols which overcomes these problems, and analyze its security against all currently known, relevant passive and active attacks. Moreover, we present an implementation of our protocol for FPGAs and ASICs using Verilog and discuss its efficiency w.r.t. generally accepted costs metrics. The respective numbers show that the (n, k, L)80-protocol is a viable alternative to existing solutions and is, for example, well suited for the implementation on passive RFID tags.


Full Text: PDF

Gesellschaft für Informatik, Bonn
ISBN 978-3-88579-622-0


Last changed 15.04.2014 18:32:21