Codes and cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
An Introduction to Cryptography
An Introduction to Cryptography
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Protocols for RFID tag/reader authentication
Decision Support Systems
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Fast and reliable random number generators for scientific computing
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Hi-index | 0.00 |
Wireless Sensor Network (WSN) nodes and passive RFID transponders (tags) have severe constraints in computing power and hence offer particular challenges in the provision of e-Security. Passive RFID tags are at the lowest end of the spectrum in the family of devices with constrained computing power and memory. New approaches, differing from the traditional cryptosystems such as RSA or Diffie-Hellman, focusing on reducing complexity while being capable of providing an adequate level of security, are required for such devices. The use of one time codes is particularly appropriate as they guarantee perfect security and offer simple implementation. However, a significant hurdle to using one time codes is the size of the keys required for encrypting data. The task is further complicated by the need to have a purely randomly generated key. This paper explores lightweight security methods based on bitoriented generators and one time codes, with the capability of meeting the constraints of resource limited devices and the demands for security services. The paper suggests as a lightweight security option, the unique capabilities and suitability of the shrinking generator for WSN nodes and low cost RFID tags.