Abstract
With the widespread use of embedded system based ubiquitous system, there is a rapid increase of the RFID/USN environment.. However, the security for the RFID/USN environment has been far behind the speed of rising security threats. In this regard, this study proposed a AES-DN embedded encryption system for RFID/USN. Compared to the existing AES, the proposed AES-DN processes 120% faster and is equipped with the DN-R method reducing node loads, which is most important for the RFID/USN environment. Therefore AES-DN is considered to be an ideal algorithm to address limited resources of the RFID/USN environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, C.-W.: Ubiquitous environments in the information protection technology (November 2008), http://www.eic.re.kr
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.L.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001)
NIST, AES Algorithm (Rijndael) Information, http://csrc.nist.gov/archive/aes/rijndael
NIST, pseudo-random number generator, http://www.itl.nist.gov/div897/sqg/dads/HTML/pseudorandomNumberGen.html
Gottfert, R., Neiderreiter, H.: On the Linear Complexity of Products of Shift Register Sequences. In: CRYPTO 1993, pp. 151–158. Springer, Heidelberg (1994)
Damaj, I., Itani, M., Diab, H.: Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. In: IEEE International Conference on Computer Systems and Applications, Aiccsa, pp. 680–684 (2006)
A candidate block cipher for the advanced encryption standard, http://www.cl.cam.ac.uk/~rja14/serpent.html
Lee, W.C.Y.: Overview of Cellular CDMA. IEEE Trans. Vehicular Tech. 40, 291–302 (1991)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Microelectronic Systems Laboratory, Implementation of DES Algorithm Using FPGA Technology (2002), http://www.alagger.com/des-vhdl/report.pdf
DES and 3DES cores, http://www.heliontech.com/des.htm
SEED block cryptographic algorithm, http://service2.nis.go.kr/pw_certified/seed.jsp
Nyberg, K., Knudsen, L.R.: Provable security against a differential attack. Journal of Cryptolog 8(1), 27–37 (1995)
Silverman, R.D.: A cost-based Security analysis of symmetric asymmetric Key lengths. Bulletin  13, RSA Lab (2000)
NIST, Draft FIPS for the AES (February 2001), http://csrc.nist.gov/publications/drafts.html
Silverman, R.D.: A cost-based Security analysis of symmetric asymmetric Key lengths. Bulletin  13, RSA Lab (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, SK., Kim, SY. (2011). The Design of AES-DN Embedded Cryptographic Processor for the RFID/USN Environment. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-27180-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27179-3
Online ISBN: 978-3-642-27180-9
eBook Packages: Computer ScienceComputer Science (R0)