SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 381
IMPLEMENTATION OF HUMMINGBIRD CRYPTOGRAPHIC
ALGORITHM FOR LOW COST RFID TAGS USING LABVIEW
Suresh.N1
, Arun prasad.J2
, Raj pritha.P.V.G3
1, 2
Assistant professor, 3
M.E, Prathyusha institute of technology and management, Thiruvallur, Tamil Nadu, India
suresh.aeme@gmail.com, Jarunprasad06@gmail.com, rajprithame@gmail.com
Abstract
Hummingbird is a novel Ultra-light weight cryptographic encryption scheme used for RFID applications of privacy-preserving
identification and mutual authentication protocols, motivated by the well known enigma machine. Hummingbird is expected to meet
the stringent response time and power consumption requirements which can provide the designed security with a small block size.This
algorithm is shown as it is resistant to the most common attacks like linear and differential cryptanalysis.Some properties for
integrating this algorithm into a privacy identification and mutual authentification protocol is investicated.This is implemented using
the LABVIEW software.
Keywords: privacy-preserving identification,mutual authentication protocols,lightweight cryptography scheme.
-----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Automatic object identification is now possible by a
technology called Radio Frequency Identification
(RFID).RFID tag is a small transponder in a RFID
system,used to label each object.Radio frequency queries can
be received and responded using tranciever,called RFID
reader.RFID is a tiny integrated circuit which is used for
storing,processing informations for identification and also
radio antenna for wireless data transmissions.Animal
identification,Point-of-sales,inventory management are the
applications for low-cost and low-power tags.
This lowcost RFID systems for object identification without
any physical contact, RFID tags and RFID reader
communication also have a number of security problems.Its
easy for an adversary to obtain sensitive information,since ther
is no mutual authentication in today’s RFID systems.By
linking two different sightings of the same RFID tag an
adversary can easily trace a person carrying a tagged
item.Unprotected wireless communication will have many
issues between FRID tags and readers.
2. HUMMINGBIRD ENCRYPTION
Inorder to overcome this security issues a new algorithm
called Hummingbird algorithm have been designed as mutual
authentication algorithm.which is a combination of both block
cipher and stream cipher,this is designed with a small block
size and expected to meet stringent response time and power
consumption.
This consists of 16-bit block size,256-bit key size and 80-bit
internal state where the key size provides security for various
RFID applications.
2.1. Encryption and Decryption
The structure of the Hummingbird algorithm consists of four
16-bit block ciphersE ,E ,E and E ,four 16-bit internal
state registers RS1,RS2,RS3 and RS4,and a 16-stage
LFSR.The secret key is 256-bit which is divided into four 64-
bit subkeys k , k ,k and k ,they can be used in four block
ciphers.In the encryption process a 16-bit plaintext PT is
executed by modulo 2 addition of PT and the first internal
state register RS1.The result of this block is then encrypted by
the first block cipher CT .
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 382
Fig 1. Encryption Process
Fig 2. Decryption Process
This procedure is repeated for three times and the output of
E is the ciphertext CT .LFSR is used for updating the
internal state registers.The reverse process is done in the
Decryption block.
2.2. 16 bit Block Cipher
Four 16-bit block ciphers are used in a consecutive
manner.Substituition and Permutation(SP) network forms the
16-bit block cipher,with 16-bit block size and 64-bit key
size.SP consists of three steps,first key mixing where 16-bit
block ciphers uses exclusive or operation for implementation
in hardware and software,second a substituition layer with 4-
inputs and 4-ouputs of serpent type s-boxes and third a
permutation layer.the linear form of 16-bit block cipher is
given by,L: 0,1 → 	 0,1 defined as,
L(m)=m⊕(m«6) (m«10),
where m=m ,m … , m ,is a 16-bit block data.
2.3. Features of S-Boxes
Inorder to reduce the area and power consumption the four s-
boxes are reduced into a single s-box and where it is repeated
four times in a 16-bit block cipher.
Four s-boxes in hexadecimal notation:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 383
3. SECURITY ANALYSIS OF HUMMINGBIRD
Hummingbird is considered as a finite state machine because
it’s a hybrid mode of block and stream cipher where the value
of LFSR does not depend on the internal states.Hummingbird
algorithm is resistant to the following attacks they are
Birthday attacks,Differential cryptanalysis,Linear
cryptanalysis,Structural attacks,Algebraic attack and cube
attacks.
4. HUMMINGBIRD MUTUAL
AUTHENTICATION PROTOCOL
The hummingbird mutual authentication protocol is mainly for
establishing the trust relationship between the RFID tags and
the reader,consider RFID system consists of a reader and N
RFID tags,where a unique 256-bit key with each tag is shared
by the reader.The following three phases are included in the
hummingbird mutual authentication protocol.
i)Phase 1:Privacy Preserving Tag Identification:
In this phase the reader will determine the correct key shared
with a tag it is communicating with without exposing the tag’s
identity to the adversaries by performing a private
identification procedure[12].
ii)Phase 2: Mutual Authentication between a Reader and a
Tag:
In this phase the reader and the tag authenticate with each
other.
iii)Phase 3:Command Execution:
In this phase the command issued and authenticated by the
reader is received and executed only by the encryption RFID
tag.
4.1.Output
CONCLUSIONS
This Hummingbird cryptographic algorithm is implemented
using the LABVIEW software,where the encryption and
decryption blocks are also designed and the output is
generated.The hummingbird 2 algorithm is compared in the
future.
REFERENCES
[1]. R. Anderson, E. Biham, and L. Knudsen, “Serpent: A
Proposal for the Advanced Encryption Standard", available at
http://www.cl.cam.ac.uk/~rja14/Papers/ serpent .pdf.
[2]. E. Biham, “Cryptanalysis of Multiple Modes of
Operation", J. Cryptology 11(1), pp. 45-58, 1998.
[3]. E. Biham, “Cryptanalysis of Triple Modes of Operation",
J. Cryptology 12(3), pp. 161-184, 1999.
[4]. E. Biham and L. R. Knudsen, “Cryptanalysis of the ANSI
X9.52 CBCM Mode", J. Cryptology 15(1), pp. 47-59, 2002.
[5]. E. Biham and A. Shamir, Differential Cryptanalysis of the
Data Encryption Standard, Springer-Verlag, New York, 1993.
[6]. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe,
“PRESENT: An Ultra-Lightweight Block Cipher", The 9th
International Workshop on Cryptographic Hardware and
Embedded Systems - CHES 2007, LNCS 4727, P. Paillier and
I.Verbauwhede (eds.), Berlin, Germany: Springer-Verlag, pp.
450-466, 2007.
[7]. I. Dinur and A. Shamir, “Cube Attacks on Tweakable
Black Box Polynomials", Advances in Cryptology -
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 384
EUROCRYPT 2009, LNCS 5479,A. Joux (ed.), Berlin,
Germany: Springer-Verlag, pp. 278-299, 2009.
[8]. EPCglobal, Inc., http://www.epcglobalinc.org/, 2005.
[9]. M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, “Strong
Authentication for RFID Systems Using the AES Algorithm",
The 6th International Workshop on Cryptographic Hardware
and Embedded Systems- CHES 2004, LNCS 3156, M. Joye
and J.-J. Quisquater (eds.), Berlin, Germany: Springer-Verlag,
pp.357-370, 2004.
[10]. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, “AES
Implementation on a Grain of Sand", IEE Proceedings
Information Security, vol. 15, no. 1, pp. 13-20, 2005.
[11]. P. HÄamÄalÄainen, T. Alho, M. HÄannikÄainen, and
T. D. HÄamÄalÄainen,”Design and Implementation of Low-
Area and Low-Power AES Encryption Hardware Core", The
9th EUROMICRO Conference on Digital System Design:
Architectures, Methods and Tools - DSD 2006, pp. 577-583,
IEEE Computer Society, 2006.
[12]. International Organization for Standardization, ISO/IEC
9782-2: Information Technology { Security Techniques {
Entity Authentication Mechanisms Part 2: Entity
Authentication using Symmetric Techniques, 1993.
[13]. T. Jakobsen and L. Knudsen, “The Interpolation Attack
on Block Ciphers", The 4th Annual Fast Software Encryption
Workshop - FSE 1997, LNCS 1267, E. Biham (ed.), Berlin,
Germany: Springer-Verlag, pp. 28-40, 1997.
[14]. X. Lai, “Higher Order Derivatives and Differential
Cryptanalysis", Proceedings of Symposium on
Communication, Coding and Cryptography, in honor of James
L. Massey on the occasion of his 60th birthday, 1994.
[15]. G. Leander, C. Paar, A. Poschmann, and K. Schramm,
“New Lightweight DES Variants", The 14th Annual Fast
Software Encryption Workshop - FSE 2007, LNCS 4593, A.
Biryukov (ed.), Berlin, Germany: Springer-Verlag, pp. 196-
210, 2007.
[16]. G. Leander and A. Poschmann, “On the Classi¯ cation of
4 Bit S-Boxes", The 1st International Work-shop on the
Arithmetic of Finite Fields - WAIFI 2007, LNCS 4547, C.
Carlet and B. Sunar (eds.), Berlin, Germany: Springer-Verlag,
pp. 159-176, 2007.
[17]. M. Matsui, “Linear Cryptanalysis Method for DES
Cipher", Advances in Cryptology - EURO-CRYPT'93, LNCS
765, T. Helleseth (ed.), Berlin, Germany: Springer-Verlag, pp.
386-397, 1993.
[18]. C. Rolfes, A. Poschmann, G. Leander, and C. Paar,
“Ultra-Lightweight Implementations for Smart Devices-
Security for 1000 Gate Equivalents", The 8th Smart Card
Research and Advanced Application IFIP Conference -
CARDIS 2008, LNCS 5189, G. Grimaud and F.-X. Standaert
(eds.), Berlin, Germany: Springer-Verlag, pp. 89-103, 2008.
[19]. D.Wagner, “Cryptanalysis of Some Recently-Proposed
Multiple Modes of Operation", The 5th Annual Fast Software
Encryption Workshop - FSE 1998, LNCS 1372, S. Vaudenay
(ed.), Berlin, Germany

More Related Content

PDF
Dt32742746
PDF
PDF
Ch34508510
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
Color Cryptography using Substitution Method
PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
PDF
Final report
PDF
Partial encryption of compresed video
Dt32742746
Ch34508510
A Survey on Generation and Evolution of Various Cryptographic Techniques
Color Cryptography using Substitution Method
Simulated Analysis and Enhancement of Blowfish Algorithm
Final report
Partial encryption of compresed video

What's hot (19)

PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
Implementation of-hybrid-cryptography-algorithm
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PDF
Wireless Network Security Architecture with Blowfish Encryption Model
PDF
Security analysis of fbdk block cipher for digital images
PDF
PDF
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
PPTX
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
PDF
Dn4301681689
PDF
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
PDF
Cryptographic Algorithms For Secure Data Communication
PDF
Image Steganography Based On Hill Cipher with Key Hiding Technique
PDF
Colour Based Cryptography
PDF
Ijcse10 01-04-37
PDF
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
PDF
G05114043
PDF
Improving Network Security by Modifying RSA Algorithm
PDF
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
A novel efficient multiple encryption algorithm for real time images
Implementation of-hybrid-cryptography-algorithm
Advanced Encryption Standard (AES) Implementaion using Java
Wireless Network Security Architecture with Blowfish Encryption Model
Security analysis of fbdk block cipher for digital images
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Dn4301681689
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
Cryptographic Algorithms For Secure Data Communication
Image Steganography Based On Hill Cipher with Key Hiding Technique
Colour Based Cryptography
Ijcse10 01-04-37
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
G05114043
Improving Network Security by Modifying RSA Algorithm
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
Ad

Viewers also liked (20)

PDF
A novel approach on a robot for the blind people which can trained and operat...
PDF
Smart digital and analogue ambience control and
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Experimental investigation of stepped aerofoil using propeller test rig
PDF
Direct torque control using neural network approach
PDF
Tqds time stamped quantum digital signature to defend
PDF
Secured key exchange by information reconciliation
PDF
Process design features of a 5 tonnesday multi – stage, intermittent drainage...
PDF
Comparison of glass fiber reinforced concrete &
PDF
Web application based file transfer in customized cloud
PDF
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
PDF
Emotional telugu speech signals classification based on k nn classifier
PDF
Pounding problems in urban areas
PDF
Design and development of mechanical power amplifier
PDF
Seasonal variation in greywater quality for a real life system
PDF
Study of properties of banana fiber reinforced composites
PDF
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
PDF
Run time dynamic partial reconfiguration using
PDF
A fuzzy logic controlled dc dc converter for an
PDF
Design of 3 d rc frame on sloping ground
A novel approach on a robot for the blind people which can trained and operat...
Smart digital and analogue ambience control and
Low cost wireless sensor networks and smartphone applications for disaster ma...
Experimental investigation of stepped aerofoil using propeller test rig
Direct torque control using neural network approach
Tqds time stamped quantum digital signature to defend
Secured key exchange by information reconciliation
Process design features of a 5 tonnesday multi – stage, intermittent drainage...
Comparison of glass fiber reinforced concrete &
Web application based file transfer in customized cloud
Reuse of inorganic sludge as a coagulant on colloidal suspension removal in r...
Emotional telugu speech signals classification based on k nn classifier
Pounding problems in urban areas
Design and development of mechanical power amplifier
Seasonal variation in greywater quality for a real life system
Study of properties of banana fiber reinforced composites
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Run time dynamic partial reconfiguration using
A fuzzy logic controlled dc dc converter for an
Design of 3 d rc frame on sloping ground
Ad

Similar to Implementation of hummingbird cryptographic (20)

PDF
A novel authenticated cipher for rfid systems
PDF
Enhancement of security in rfid using rsa algorithm
PPTX
Shilpa ppt
PDF
Secured authentication of radio-frequency identification system using PRESENT...
PDF
Performance Analysis of New Light Weight Cryptographic Algorithms
DOC
A vlsi implementation of a resource efficient and secure architecture of a b...
DOC
A vlsi implementation of a resource efficient and secure architecture of a b...
PDF
Improving Cloud Security Using Multi Level Encryption and Authentication
PDF
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
PDF
Ijarcet vol-2-issue-3-867-869
PDF
IRJET - A Review on Crypto-Algorithm using Different Hardware
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PDF
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
PDF
IRJET - Lightweight ECC based RFID Authentication Protocol
PDF
A novel architecture for lightweight block cipher, piccolo
PDF
Rfid authentication protocols using symmetric cryptography (2)
PDF
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
PDF
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
PDF
IRJET- Message Encryption using Hybrid Cryptography
PDF
Secured e-payment system based on automated authentication data and iterated ...
A novel authenticated cipher for rfid systems
Enhancement of security in rfid using rsa algorithm
Shilpa ppt
Secured authentication of radio-frequency identification system using PRESENT...
Performance Analysis of New Light Weight Cryptographic Algorithms
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
Improving Cloud Security Using Multi Level Encryption and Authentication
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Ijarcet vol-2-issue-3-867-869
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET- Enhanced SIT Algorithm for Embedded Systems
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
IRJET - Lightweight ECC based RFID Authentication Protocol
A novel architecture for lightweight block cipher, piccolo
Rfid authentication protocols using symmetric cryptography (2)
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
IRJET- Message Encryption using Hybrid Cryptography
Secured e-payment system based on automated authentication data and iterated ...

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
PDF
Disaster recovery sustainable housing
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Disaster recovery sustainable housing

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
web development for engineering and engineering
PPTX
Current and future trends in Computer Vision.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Construction Project Organization Group 2.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
web development for engineering and engineering
Current and future trends in Computer Vision.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Operating System & Kernel Study Guide-1 - converted.pdf
OOP with Java - Java Introduction (Basics)
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
III.4.1.2_The_Space_Environment.p pdffdf
Sustainable Sites - Green Building Construction
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Construction Project Organization Group 2.pptx
Fundamentals of safety and accident prevention -final (1).pptx
R24 SURVEYING LAB MANUAL for civil enggi
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
composite construction of structures.pdf

Implementation of hummingbird cryptographic

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 381 IMPLEMENTATION OF HUMMINGBIRD CRYPTOGRAPHIC ALGORITHM FOR LOW COST RFID TAGS USING LABVIEW Suresh.N1 , Arun prasad.J2 , Raj pritha.P.V.G3 1, 2 Assistant professor, 3 M.E, Prathyusha institute of technology and management, Thiruvallur, Tamil Nadu, India suresh.aeme@gmail.com, Jarunprasad06@gmail.com, rajprithame@gmail.com Abstract Hummingbird is a novel Ultra-light weight cryptographic encryption scheme used for RFID applications of privacy-preserving identification and mutual authentication protocols, motivated by the well known enigma machine. Hummingbird is expected to meet the stringent response time and power consumption requirements which can provide the designed security with a small block size.This algorithm is shown as it is resistant to the most common attacks like linear and differential cryptanalysis.Some properties for integrating this algorithm into a privacy identification and mutual authentification protocol is investicated.This is implemented using the LABVIEW software. Keywords: privacy-preserving identification,mutual authentication protocols,lightweight cryptography scheme. -----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Automatic object identification is now possible by a technology called Radio Frequency Identification (RFID).RFID tag is a small transponder in a RFID system,used to label each object.Radio frequency queries can be received and responded using tranciever,called RFID reader.RFID is a tiny integrated circuit which is used for storing,processing informations for identification and also radio antenna for wireless data transmissions.Animal identification,Point-of-sales,inventory management are the applications for low-cost and low-power tags. This lowcost RFID systems for object identification without any physical contact, RFID tags and RFID reader communication also have a number of security problems.Its easy for an adversary to obtain sensitive information,since ther is no mutual authentication in today’s RFID systems.By linking two different sightings of the same RFID tag an adversary can easily trace a person carrying a tagged item.Unprotected wireless communication will have many issues between FRID tags and readers. 2. HUMMINGBIRD ENCRYPTION Inorder to overcome this security issues a new algorithm called Hummingbird algorithm have been designed as mutual authentication algorithm.which is a combination of both block cipher and stream cipher,this is designed with a small block size and expected to meet stringent response time and power consumption. This consists of 16-bit block size,256-bit key size and 80-bit internal state where the key size provides security for various RFID applications. 2.1. Encryption and Decryption The structure of the Hummingbird algorithm consists of four 16-bit block ciphersE ,E ,E and E ,four 16-bit internal state registers RS1,RS2,RS3 and RS4,and a 16-stage LFSR.The secret key is 256-bit which is divided into four 64- bit subkeys k , k ,k and k ,they can be used in four block ciphers.In the encryption process a 16-bit plaintext PT is executed by modulo 2 addition of PT and the first internal state register RS1.The result of this block is then encrypted by the first block cipher CT .
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 382 Fig 1. Encryption Process Fig 2. Decryption Process This procedure is repeated for three times and the output of E is the ciphertext CT .LFSR is used for updating the internal state registers.The reverse process is done in the Decryption block. 2.2. 16 bit Block Cipher Four 16-bit block ciphers are used in a consecutive manner.Substituition and Permutation(SP) network forms the 16-bit block cipher,with 16-bit block size and 64-bit key size.SP consists of three steps,first key mixing where 16-bit block ciphers uses exclusive or operation for implementation in hardware and software,second a substituition layer with 4- inputs and 4-ouputs of serpent type s-boxes and third a permutation layer.the linear form of 16-bit block cipher is given by,L: 0,1 → 0,1 defined as, L(m)=m⊕(m«6) (m«10), where m=m ,m … , m ,is a 16-bit block data. 2.3. Features of S-Boxes Inorder to reduce the area and power consumption the four s- boxes are reduced into a single s-box and where it is repeated four times in a 16-bit block cipher. Four s-boxes in hexadecimal notation:
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 383 3. SECURITY ANALYSIS OF HUMMINGBIRD Hummingbird is considered as a finite state machine because it’s a hybrid mode of block and stream cipher where the value of LFSR does not depend on the internal states.Hummingbird algorithm is resistant to the following attacks they are Birthday attacks,Differential cryptanalysis,Linear cryptanalysis,Structural attacks,Algebraic attack and cube attacks. 4. HUMMINGBIRD MUTUAL AUTHENTICATION PROTOCOL The hummingbird mutual authentication protocol is mainly for establishing the trust relationship between the RFID tags and the reader,consider RFID system consists of a reader and N RFID tags,where a unique 256-bit key with each tag is shared by the reader.The following three phases are included in the hummingbird mutual authentication protocol. i)Phase 1:Privacy Preserving Tag Identification: In this phase the reader will determine the correct key shared with a tag it is communicating with without exposing the tag’s identity to the adversaries by performing a private identification procedure[12]. ii)Phase 2: Mutual Authentication between a Reader and a Tag: In this phase the reader and the tag authenticate with each other. iii)Phase 3:Command Execution: In this phase the command issued and authenticated by the reader is received and executed only by the encryption RFID tag. 4.1.Output CONCLUSIONS This Hummingbird cryptographic algorithm is implemented using the LABVIEW software,where the encryption and decryption blocks are also designed and the output is generated.The hummingbird 2 algorithm is compared in the future. REFERENCES [1]. R. Anderson, E. Biham, and L. Knudsen, “Serpent: A Proposal for the Advanced Encryption Standard", available at http://www.cl.cam.ac.uk/~rja14/Papers/ serpent .pdf. [2]. E. Biham, “Cryptanalysis of Multiple Modes of Operation", J. Cryptology 11(1), pp. 45-58, 1998. [3]. E. Biham, “Cryptanalysis of Triple Modes of Operation", J. Cryptology 12(3), pp. 161-184, 1999. [4]. E. Biham and L. R. Knudsen, “Cryptanalysis of the ANSI X9.52 CBCM Mode", J. Cryptology 15(1), pp. 47-59, 2002. [5]. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. [6]. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher", The 9th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2007, LNCS 4727, P. Paillier and I.Verbauwhede (eds.), Berlin, Germany: Springer-Verlag, pp. 450-466, 2007. [7]. I. Dinur and A. Shamir, “Cube Attacks on Tweakable Black Box Polynomials", Advances in Cryptology -
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 384 EUROCRYPT 2009, LNCS 5479,A. Joux (ed.), Berlin, Germany: Springer-Verlag, pp. 278-299, 2009. [8]. EPCglobal, Inc., http://www.epcglobalinc.org/, 2005. [9]. M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, “Strong Authentication for RFID Systems Using the AES Algorithm", The 6th International Workshop on Cryptographic Hardware and Embedded Systems- CHES 2004, LNCS 3156, M. Joye and J.-J. Quisquater (eds.), Berlin, Germany: Springer-Verlag, pp.357-370, 2004. [10]. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, “AES Implementation on a Grain of Sand", IEE Proceedings Information Security, vol. 15, no. 1, pp. 13-20, 2005. [11]. P. HÄamÄalÄainen, T. Alho, M. HÄannikÄainen, and T. D. HÄamÄalÄainen,”Design and Implementation of Low- Area and Low-Power AES Encryption Hardware Core", The 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools - DSD 2006, pp. 577-583, IEEE Computer Society, 2006. [12]. International Organization for Standardization, ISO/IEC 9782-2: Information Technology { Security Techniques { Entity Authentication Mechanisms Part 2: Entity Authentication using Symmetric Techniques, 1993. [13]. T. Jakobsen and L. Knudsen, “The Interpolation Attack on Block Ciphers", The 4th Annual Fast Software Encryption Workshop - FSE 1997, LNCS 1267, E. Biham (ed.), Berlin, Germany: Springer-Verlag, pp. 28-40, 1997. [14]. X. Lai, “Higher Order Derivatives and Differential Cryptanalysis", Proceedings of Symposium on Communication, Coding and Cryptography, in honor of James L. Massey on the occasion of his 60th birthday, 1994. [15]. G. Leander, C. Paar, A. Poschmann, and K. Schramm, “New Lightweight DES Variants", The 14th Annual Fast Software Encryption Workshop - FSE 2007, LNCS 4593, A. Biryukov (ed.), Berlin, Germany: Springer-Verlag, pp. 196- 210, 2007. [16]. G. Leander and A. Poschmann, “On the Classi¯ cation of 4 Bit S-Boxes", The 1st International Work-shop on the Arithmetic of Finite Fields - WAIFI 2007, LNCS 4547, C. Carlet and B. Sunar (eds.), Berlin, Germany: Springer-Verlag, pp. 159-176, 2007. [17]. M. Matsui, “Linear Cryptanalysis Method for DES Cipher", Advances in Cryptology - EURO-CRYPT'93, LNCS 765, T. Helleseth (ed.), Berlin, Germany: Springer-Verlag, pp. 386-397, 1993. [18]. C. Rolfes, A. Poschmann, G. Leander, and C. Paar, “Ultra-Lightweight Implementations for Smart Devices- Security for 1000 Gate Equivalents", The 8th Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, LNCS 5189, G. Grimaud and F.-X. Standaert (eds.), Berlin, Germany: Springer-Verlag, pp. 89-103, 2008. [19]. D.Wagner, “Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation", The 5th Annual Fast Software Encryption Workshop - FSE 1998, LNCS 1372, S. Vaudenay (ed.), Berlin, Germany