Skip to main content

The Design of AES-DN Embedded Cryptographic Processor for the RFID/USN Environment

  • Conference paper
Grid and Distributed Computing (GDC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 261))

Included in the following conference series:

  • 1518 Accesses

Abstract

With the widespread use of embedded system based ubiquitous system, there is a rapid increase of the RFID/USN environment.. However, the security for the RFID/USN environment has been far behind the speed of rising security threats. In this regard, this study proposed a AES-DN embedded encryption system for RFID/USN. Compared to the existing AES, the proposed AES-DN processes 120% faster and is equipped with the DN-R method reducing node loads, which is most important for the RFID/USN environment. Therefore AES-DN is considered to be an ideal algorithm to address limited resources of the RFID/USN environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, C.-W.: Ubiquitous environments in the information protection technology (November 2008), http://www.eic.re.kr

  2. Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.L.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. NIST, AES Algorithm (Rijndael) Information, http://csrc.nist.gov/archive/aes/rijndael

  4. NIST, pseudo-random number generator, http://www.itl.nist.gov/div897/sqg/dads/HTML/pseudorandomNumberGen.html

  5. Gottfert, R., Neiderreiter, H.: On the Linear Complexity of Products of Shift Register Sequences. In: CRYPTO 1993, pp. 151–158. Springer, Heidelberg (1994)

    Google Scholar 

  6. Damaj, I., Itani, M., Diab, H.: Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. In: IEEE International Conference on Computer Systems and Applications, Aiccsa, pp. 680–684 (2006)

    Google Scholar 

  7. A candidate block cipher for the advanced encryption standard, http://www.cl.cam.ac.uk/~rja14/serpent.html

  8. Lee, W.C.Y.: Overview of Cellular CDMA. IEEE Trans. Vehicular Tech. 40, 291–302 (1991)

    Article  Google Scholar 

  9. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  10. Microelectronic Systems Laboratory, Implementation of DES Algorithm Using FPGA Technology (2002), http://www.alagger.com/des-vhdl/report.pdf

  11. DES and 3DES cores, http://www.heliontech.com/des.htm

  12. SEED block cryptographic algorithm, http://service2.nis.go.kr/pw_certified/seed.jsp

  13. Nyberg, K., Knudsen, L.R.: Provable security against a differential attack. Journal of Cryptolog 8(1), 27–37 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  14. Silverman, R.D.: A cost-based Security analysis of symmetric asymmetric Key lengths. Bulletin  13, RSA Lab (2000)

    Google Scholar 

  15. NIST, Draft FIPS for the AES (February 2001), http://csrc.nist.gov/publications/drafts.html

  16. Silverman, R.D.: A cost-based Security analysis of symmetric asymmetric Key lengths. Bulletin  13, RSA Lab (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, SK., Kim, SY. (2011). The Design of AES-DN Embedded Cryptographic Processor for the RFID/USN Environment. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27180-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27179-3

  • Online ISBN: 978-3-642-27180-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics