2013 Euromicro Conference on Digital System Design 2013
DOI: 10.1109/dsd.2013.117
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Authenticated Encryption Algorithm for RFID Systems

Abstract: In this paper a light symmetric encryption algorithm is presented for resource constrained applications like RFID systems. In this algorithm some extra bits are distributed among plaintext bits where the location of these bits inside the ciphertext is the secret key. The algorithm provides confidentiality, authentication, and integrity services. Experimental results confirm that its area overhead and power overhead is less than other known symmetric algorithms proposed for RFID systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…From Table 2, it can be summarized that work by Sharma and Singh (2017), Lin et al (2013) and Bhave and Jajoo (2015) combined the symmetric and asymmetric algorithms to strengthen the security of RFID systems. Besides, it can be seen that the work by Jeddi et al (2013) and Bu and Li (2018) also integrated MAC and Digital Signature Algorithm to provide data authentication in the system.…”
Section: Hybrid Security Approach In Rfid Related-iotmentioning
confidence: 99%
“…From Table 2, it can be summarized that work by Sharma and Singh (2017), Lin et al (2013) and Bhave and Jajoo (2015) combined the symmetric and asymmetric algorithms to strengthen the security of RFID systems. Besides, it can be seen that the work by Jeddi et al (2013) and Bu and Li (2018) also integrated MAC and Digital Signature Algorithm to provide data authentication in the system.…”
Section: Hybrid Security Approach In Rfid Related-iotmentioning
confidence: 99%
“…Later, the same approach was extended to offer authentication to the message. A plain text of 64-bit is merged with 68-bit redundant bit, which is encrypted using a 132-bit key [18].…”
Section: Background and Literature Reviewmentioning
confidence: 99%