A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols

نویسندگان

چکیده

Radio Frequency Identification (RFID) systems have bestowed numerous conveniences in a multitude of applications, but the underlying wireless communications architecture makes it vulnerable to several security threats. To mitigate these issues, various authentication protocols been proposed. The literature accommodates comprehensive proposals and analysis protocols, not many them provide hardware implementations. In addition, there is diverse demand for area throughput (TP) requirements from RFID system components (tags, readers, database servers), which flexible implementation strategy. This paper proposes strategy lightweight authenticated encryption (AE) hash function called Gimli, applies state-of-the-art protocol. allows protocol be implemented efficiently, wherein TP can adjusted flexibly according requirements. generic; used implement any other AE functions. also applied that heavily use detailed analysis, optimization techniques each component are analyzed. When with most area-optimized versions, we achieve 740 Mbps 420 Gimli AE, respectively, throughput-oriented implementation, results 3.08 Gbps 1.43 Gbps, respectively. shows proposed strategies allow us manner meet differing applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

construction and validation of translation metacognitive strategy questionnaire and its application to translation quality

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

ASIP Design and FPGA Implementation of Fingerprint Authentication Application

This paper presents an ASIP design for fingerprint authentication application and its implementation on FPGA. The ASIP architecture is derived from existing embedded processor architecture, ARM. In order to optimize the architecture, some redundant features are removed but other new instructions are introduced. Assembly converter tool is employed to solve the compiler generation. Implemented on...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

SAD implementation in FPGA hardware

In this paper, we propose a new unit intended to augment a general-purpose core that is able to perform a SAD operation. We show that the SAD implementation can easily be extended to perform the complete SAD operation. The SAD operation is commonly used in many multimedia standards, including MPEG-1 and MPEG-2. We have chosen to implement the SAD operation in field-programmable gate arrays (FPG...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3100104