Exploring the Design Space of the GPS Authentication Scheme

نویسنده

  • Georg Hofferek
چکیده

GPS is a public-key zero-knowledge protocol, which provides unilateral authentication and offers a rather large design space of possible implementation variants compared to other authentication schemes. Due to its flexibility it has been suggested for use in passive RFID tags, challenging the doctrine that public-key cryptography is too complex for passive devices. In its smallest configuration, GPS allows to use a coupon-based approach where only simple integer operations need to be computed on the prover’s side during authentication. More complex forms which require computation of number-theoretic operations, hashes, and random numbers form the opposite border of the design space. This work presents an approach where complex number-theoretic operations are (slowly) precomputed during idle time of the tag. The idea is to accept longer execution times to save chip area and decrease power consumption. To the best of the author’s knowledge this is the first time that this approach has been attempted with GPS. Several (parameterizable) architectures will be presented and discussed. The smallest full-precision arithmetic unit requires approximately 50000 gate equivalents and can calculate one commitment in about 2.4 million clock cycles. When using digit-level arithmetic, the size of the arithmetic unit can be reduced significantly. Using a digit size of 8 bits, the arithmetic unit takes only about 800 gate equivalents (plus RAM space for 560 bytes), at the price of spending approximately 66.6 million clock cycles for one commitment calculation. However, due to its short critical path this unit could be operated at frequencies up to about 290 MHz, when synthesized for UMC 0.13μm CMOS technology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008