Detailed Information

Cited 4 time in webofscience Cited 4 time in scopus
Metadata Downloads

A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols

Authors
Khan, SafiullahLee, Wai-KongHwang, Seong Oun
Issue Date
Jul-2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Hardware; Radiofrequency identification; Protocols; Authentication; Field programmable gate arrays; Ciphers; Hash functions; Authenticated encryption; FPGA; Gimli; lightweight cryptography; RFID
Citation
IEEE ACCESS, v.9, pp.105327 - 105340
Journal Title
IEEE ACCESS
Volume
9
Start Page
105327
End Page
105340
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81851
DOI
10.1109/ACCESS.2021.3100104
ISSN
2169-3536
Abstract
Radio Frequency Identification (RFID) systems have bestowed numerous conveniences in a multitude of applications, but the underlying wireless communications architecture makes it vulnerable to several security threats. To mitigate these issues, various authentication protocols have been proposed. The literature accommodates comprehensive proposals and analysis of authentication protocols, but not many of them provide hardware implementations. In addition, there is diverse demand for hardware area and throughput (TP) requirements from RFID system components (tags, readers, database servers), which demand a flexible implementation strategy. This paper proposes a flexible implementation strategy for the lightweight authenticated encryption (AE) and hash function called Gimli, and applies it to a state-of-the-art authentication protocol. This allows the authentication protocol to be implemented efficiently, wherein the area and TP can be adjusted flexibly according to the RFID system requirements. This implementation strategy is generic; it can be used to implement any other AE and hash functions. This strategy can also be applied to other authentication protocols that heavily use AE and hash functions. To provide a detailed analysis, the hardware optimization techniques in each component of the RFID system for a state-of-the-art authentication protocol are analyzed. When implemented with the most area-optimized versions, we achieve TP of 740 Mbps and 420 Mbps for Gimli hash and Gimli AE, respectively, and for throughput-oriented implementation, the results are 3.08 Gbps and 1.43 Gbps, respectively. This shows that the proposed implementation strategies allow us to implement authentication protocols in a flexible manner to meet the differing requirements in TP and area for RFID applications.
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE