SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 381
IMPLEMENTATION OF HUMMINGBIRD CRYPTOGRAPHIC
ALGORITHM FOR LOW COST RFID TAGS USING LABVIEW
Suresh.N1
, Arun prasad.J2
, Raj pritha.P.V.G3
1, 2
Assistant professor, 3
M.E, Prathyusha institute of technology and management, Thiruvallur, Tamil Nadu, India
suresh.aeme@gmail.com, Jarunprasad06@gmail.com, rajprithame@gmail.com
Abstract
Hummingbird is a novel Ultra-light weight cryptographic encryption scheme used for RFID applications of privacy-preserving
identification and mutual authentication protocols, motivated by the well known enigma machine. Hummingbird is expected to meet
the stringent response time and power consumption requirements which can provide the designed security with a small block size.This
algorithm is shown as it is resistant to the most common attacks like linear and differential cryptanalysis.Some properties for
integrating this algorithm into a privacy identification and mutual authentification protocol is investicated.This is implemented using
the LABVIEW software.
Keywords: privacy-preserving identification,mutual authentication protocols,lightweight cryptography scheme.
-----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Automatic object identification is now possible by a
technology called Radio Frequency Identification
(RFID).RFID tag is a small transponder in a RFID
system,used to label each object.Radio frequency queries can
be received and responded using tranciever,called RFID
reader.RFID is a tiny integrated circuit which is used for
storing,processing informations for identification and also
radio antenna for wireless data transmissions.Animal
identification,Point-of-sales,inventory management are the
applications for low-cost and low-power tags.
This lowcost RFID systems for object identification without
any physical contact, RFID tags and RFID reader
communication also have a number of security problems.Its
easy for an adversary to obtain sensitive information,since ther
is no mutual authentication in today’s RFID systems.By
linking two different sightings of the same RFID tag an
adversary can easily trace a person carrying a tagged
item.Unprotected wireless communication will have many
issues between FRID tags and readers.
2. HUMMINGBIRD ENCRYPTION
Inorder to overcome this security issues a new algorithm
called Hummingbird algorithm have been designed as mutual
authentication algorithm.which is a combination of both block
cipher and stream cipher,this is designed with a small block
size and expected to meet stringent response time and power
consumption.
This consists of 16-bit block size,256-bit key size and 80-bit
internal state where the key size provides security for various
RFID applications.
2.1. Encryption and Decryption
The structure of the Hummingbird algorithm consists of four
16-bit block ciphersEK1,EK2,EK3 and EK4,four 16-bit internal
state registers RS1,RS2,RS3 and RS4,and a 16-stage
LFSR.The secret key is 256-bit which is divided into four 64-
bit subkeys k1, k2,k3 and k4,they can be used in four block
ciphers.In the encryption process a 16-bit plaintext PTi is
executed by modulo 216
addition of PTiand the first internal
state register RS1.The result of this block is then encrypted by
the first block cipher CTi.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 382
Fig 1. Encryption Process
Fig 2. Decryption Process
This procedure is repeated for three times and the output of
EK4 is the ciphertext CTi.LFSR is used for updating the
internal state registers.The reverse process is done in the
Decryption block.
2.2. 16 bit Block Cipher
Four 16-bit block ciphers are used in a consecutive
manner.Substituition and Permutation(SP) network forms the
16-bit block cipher,with 16-bit block size and 64-bit key
size.SP consists of three steps,first key mixing where 16-bit
block ciphers uses exclusive or operation for implementation
in hardware and software,second a substituition layer with 4-
inputs and 4-ouputs of serpent type s-boxes and third a
permutation layer.the linear form of 16-bit block cipher is
given by,L: {0,1}16
→ {0,1}16
defined as,
L(m)=m⊕(m«6)⊕(m«10),
where m=m0,m1 … , m15,is a 16-bit block data.
2.3. Features of S-Boxes
Inorder to reduce the area and power consumption the four s-
boxes are reduced into a single s-box and where it is repeated
four times in a 16-bit block cipher.
Four s-boxes in hexadecimal notation:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 383
3. SECURITY ANALYSIS OF HUMMINGBIRD
Hummingbird is considered as a finite state machine because
it’s a hybrid mode of block and stream cipher where the value
of LFSR does not depend on the internal states.Hummingbird
algorithm is resistant to the following attacks they are
Birthday attacks,Differential cryptanalysis,Linear
cryptanalysis,Structural attacks,Algebraic attack and cube
attacks.
4. HUMMINGBIRD MUTUAL
AUTHENTICATION PROTOCOL
The hummingbird mutual authentication protocol is mainly for
establishing the trust relationship between the RFID tags and
the reader,consider RFID system consists of a reader and N
RFID tags,where a unique 256-bit key with each tag is shared
by the reader.The following three phases are included in the
hummingbird mutual authentication protocol.
i)Phase 1:Privacy Preserving Tag Identification:
In this phase the reader will determine the correct key shared
with a tag it is communicating with without exposing the tag’s
identity to the adversaries by performing a private
identification procedure[12].
ii)Phase 2: Mutual Authentication between a Reader and a
Tag:
In this phase the reader and the tag authenticate with each
other.
iii)Phase 3:Command Execution:
In this phase the command issued and authenticated by the
reader is received and executed only by the encryption RFID
tag.
4.1.Output
CONCLUSIONS
This Hummingbird cryptographic algorithm is implemented
using the LABVIEW software,where the encryption and
decryption blocks are also designed and the output is
generated.The hummingbird 2 algorithm is compared in the
future.
REFERENCES
[1]. R. Anderson, E. Biham, and L. Knudsen, “Serpent: A
Proposal for the Advanced Encryption Standard", available at
http://www.cl.cam.ac.uk/~rja14/Papers/ serpent .pdf.
[2]. E. Biham, “Cryptanalysis of Multiple Modes of
Operation", J. Cryptology 11(1), pp. 45-58, 1998.
[3]. E. Biham, “Cryptanalysis of Triple Modes of Operation",
J. Cryptology 12(3), pp. 161-184, 1999.
[4]. E. Biham and L. R. Knudsen, “Cryptanalysis of the ANSI
X9.52 CBCM Mode", J. Cryptology 15(1), pp. 47-59, 2002.
[5]. E. Biham and A. Shamir, Differential Cryptanalysis of the
Data Encryption Standard, Springer-Verlag, New York, 1993.
[6]. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A.
Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe,
“PRESENT: An Ultra-Lightweight Block Cipher", The 9th
International Workshop on Cryptographic Hardware and
Embedded Systems - CHES 2007, LNCS 4727, P. Paillier and
I.Verbauwhede (eds.), Berlin, Germany: Springer-Verlag, pp.
450-466, 2007.
[7]. I. Dinur and A. Shamir, “Cube Attacks on Tweakable
Black Box Polynomials", Advances in Cryptology -
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 384
EUROCRYPT 2009, LNCS 5479,A. Joux (ed.), Berlin,
Germany: Springer-Verlag, pp. 278-299, 2009.
[8]. EPCglobal, Inc., http://www.epcglobalinc.org/, 2005.
[9]. M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, “Strong
Authentication for RFID Systems Using the AES Algorithm",
The 6th International Workshop on Cryptographic Hardware
and Embedded Systems- CHES 2004, LNCS 3156, M. Joye
and J.-J. Quisquater (eds.), Berlin, Germany: Springer-Verlag,
pp.357-370, 2004.
[10]. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, “AES
Implementation on a Grain of Sand", IEE Proceedings
Information Security, vol. 15, no. 1, pp. 13-20, 2005.
[11]. P. HÄamÄalÄainen, T. Alho, M. HÄannikÄainen, and
T. D. HÄamÄalÄainen,”Design and Implementation of Low-
Area and Low-Power AES Encryption Hardware Core", The
9th EUROMICRO Conference on Digital System Design:
Architectures, Methods and Tools - DSD 2006, pp. 577-583,
IEEE Computer Society, 2006.
[12]. International Organization for Standardization, ISO/IEC
9782-2: Information Technology { Security Techniques {
Entity Authentication Mechanisms Part 2: Entity
Authentication using Symmetric Techniques, 1993.
[13]. T. Jakobsen and L. Knudsen, “The Interpolation Attack
on Block Ciphers", The 4th Annual Fast Software Encryption
Workshop - FSE 1997, LNCS 1267, E. Biham (ed.), Berlin,
Germany: Springer-Verlag, pp. 28-40, 1997.
[14]. X. Lai, “Higher Order Derivatives and Differential
Cryptanalysis", Proceedings of Symposium on
Communication, Coding and Cryptography, in honor of James
L. Massey on the occasion of his 60th birthday, 1994.
[15]. G. Leander, C. Paar, A. Poschmann, and K. Schramm,
“New Lightweight DES Variants", The 14th Annual Fast
Software Encryption Workshop - FSE 2007, LNCS 4593, A.
Biryukov (ed.), Berlin, Germany: Springer-Verlag, pp. 196-
210, 2007.
[16]. G. Leander and A. Poschmann, “On the Classi¯cation of
4 Bit S-Boxes", The 1st International Work-shop on the
Arithmetic of Finite Fields - WAIFI 2007, LNCS 4547, C.
Carlet and B. Sunar (eds.), Berlin, Germany: Springer-Verlag,
pp. 159-176, 2007.
[17]. M. Matsui, “Linear Cryptanalysis Method for DES
Cipher", Advances in Cryptology - EURO-CRYPT'93, LNCS
765, T. Helleseth (ed.), Berlin, Germany: Springer-Verlag, pp.
386-397, 1993.
[18]. C. Rolfes, A. Poschmann, G. Leander, and C. Paar,
“Ultra-Lightweight Implementations for Smart Devices-
Security for 1000 Gate Equivalents", The 8th Smart Card
Research and Advanced Application IFIP Conference -
CARDIS 2008, LNCS 5189, G. Grimaud and F.-X. Standaert
(eds.), Berlin, Germany: Springer-Verlag, pp. 89-103, 2008.
[19]. D.Wagner, “Cryptanalysis of Some Recently-Proposed
Multiple Modes of Operation", The 5th Annual Fast Software
Encryption Workshop - FSE 1998, LNCS 1372, S. Vaudenay
(ed.), Berlin, Germany

More Related Content

What's hot

Ce35461464
Ce35461464Ce35461464
Ce35461464
IJERA Editor
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antenna
eSAT Publishing House
 
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
eSAT Journals
 
Design and analysis of reduced size conical shape
Design and analysis of reduced size conical shapeDesign and analysis of reduced size conical shape
Design and analysis of reduced size conical shape
eSAT Publishing House
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX ApplicationsA CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
IDES Editor
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangular
eSAT Publishing House
 
Directly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband applicationDirectly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband application
eSAT Publishing House
 
IRJET- Microstrip Patch Antenna Design for Military Applications
IRJET- Microstrip Patch Antenna Design for Military ApplicationsIRJET- Microstrip Patch Antenna Design for Military Applications
IRJET- Microstrip Patch Antenna Design for Military Applications
IRJET Journal
 
5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna 5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna
IJECEIAES
 
Parametric Analysis of Single Element U Slot Microstrip Antenna
Parametric Analysis of Single Element U Slot Microstrip AntennaParametric Analysis of Single Element U Slot Microstrip Antenna
Parametric Analysis of Single Element U Slot Microstrip Antenna
IJSRD
 
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
IRJET Journal
 
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
IRJET Journal
 
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSSDesign & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
IJERA Editor
 
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
IOSR Journals
 
A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlanA pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlan
IAEME Publication
 
IRJET- Metamaterial Incorporated Planar Antenna for Improving Parameters
IRJET-  	  Metamaterial Incorporated Planar Antenna for Improving ParametersIRJET-  	  Metamaterial Incorporated Planar Antenna for Improving Parameters
IRJET- Metamaterial Incorporated Planar Antenna for Improving Parameters
IRJET Journal
 
Design of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled techniqueDesign of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled technique
eSAT Publishing House
 
Magnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applicationsMagnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applications
journalBEEI
 

What's hot (19)

Ce35461464
Ce35461464Ce35461464
Ce35461464
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antenna
 
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
 
Design and analysis of reduced size conical shape
Design and analysis of reduced size conical shapeDesign and analysis of reduced size conical shape
Design and analysis of reduced size conical shape
 
H011135565
H011135565H011135565
H011135565
 
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX ApplicationsA CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
A CPW-fed Rectangular Patch Antenna for WLAN/WiMAX Applications
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangular
 
Directly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband applicationDirectly coupled microstrip array antennas for wideband application
Directly coupled microstrip array antennas for wideband application
 
IRJET- Microstrip Patch Antenna Design for Military Applications
IRJET- Microstrip Patch Antenna Design for Military ApplicationsIRJET- Microstrip Patch Antenna Design for Military Applications
IRJET- Microstrip Patch Antenna Design for Military Applications
 
5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna 5G Fixed Beam Switching on Microstrip Patch Antenna
5G Fixed Beam Switching on Microstrip Patch Antenna
 
Parametric Analysis of Single Element U Slot Microstrip Antenna
Parametric Analysis of Single Element U Slot Microstrip AntennaParametric Analysis of Single Element U Slot Microstrip Antenna
Parametric Analysis of Single Element U Slot Microstrip Antenna
 
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
IRJET- Multiple Band Microstrip Patch Antenna with DGS for X Band, Ku Band an...
 
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
IRJET- Design of Composite Circular Microstrip Patch Dual Band Antenna for Wi...
 
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSSDesign & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
Design & Simulation of single frequency Rectangular Patch Antenna by Using HFSS
 
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
 
A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlanA pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlan
 
IRJET- Metamaterial Incorporated Planar Antenna for Improving Parameters
IRJET-  	  Metamaterial Incorporated Planar Antenna for Improving ParametersIRJET-  	  Metamaterial Incorporated Planar Antenna for Improving Parameters
IRJET- Metamaterial Incorporated Planar Antenna for Improving Parameters
 
Design of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled techniqueDesign of wide band microstrip array antenna using direct coupled technique
Design of wide band microstrip array antenna using direct coupled technique
 
Magnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applicationsMagnetic resonance coupling for 5G WPT applications
Magnetic resonance coupling for 5G WPT applications
 

Viewers also liked

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
eSAT Journals
 
Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...
eSAT Journals
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
eSAT Journals
 
Routing of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation systemRouting of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation system
eSAT Journals
 
Modeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technologyModeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technology
eSAT Journals
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
eSAT Journals
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building site
eSAT Journals
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
eSAT Journals
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backbone
eSAT Journals
 
Self compacting concrete for slip form paving
Self compacting concrete for slip form pavingSelf compacting concrete for slip form paving
Self compacting concrete for slip form paving
eSAT Journals
 
Mathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrotMathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrot
eSAT Journals
 
Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...
eSAT Journals
 
Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...
eSAT Journals
 
Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...
eSAT Journals
 
Reliability based selection of standard steel beams
Reliability based selection of standard steel beamsReliability based selection of standard steel beams
Reliability based selection of standard steel beams
eSAT Journals
 
Review on blended concretes
Review on blended concretesReview on blended concretes
Review on blended concretes
eSAT Journals
 
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
eSAT Journals
 
Study of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connectorStudy of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connector
eSAT Journals
 
Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...
eSAT Journals
 

Viewers also liked (19)

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...Power system restoration in distribution network through reconfiguration usin...
Power system restoration in distribution network through reconfiguration usin...
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
 
Routing of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation systemRouting of traffic sensors in intelligent transportation system
Routing of traffic sensors in intelligent transportation system
 
Modeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technologyModeling and analysis of control circuit for biogas electrification technology
Modeling and analysis of control circuit for biogas electrification technology
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building site
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backbone
 
Self compacting concrete for slip form paving
Self compacting concrete for slip form pavingSelf compacting concrete for slip form paving
Self compacting concrete for slip form paving
 
Mathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrotMathematical model study on solvent extraction of carotene from carrot
Mathematical model study on solvent extraction of carotene from carrot
 
Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...Numerical simulation on laminar convection flow and heat transfer over an iso...
Numerical simulation on laminar convection flow and heat transfer over an iso...
 
Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...Design and fabrication of prototype of multipurpose machine for sheet metal o...
Design and fabrication of prototype of multipurpose machine for sheet metal o...
 
Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...Improving productivity of apparel manufacturing system using value stream map...
Improving productivity of apparel manufacturing system using value stream map...
 
Reliability based selection of standard steel beams
Reliability based selection of standard steel beamsReliability based selection of standard steel beams
Reliability based selection of standard steel beams
 
Review on blended concretes
Review on blended concretesReview on blended concretes
Review on blended concretes
 
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...Soil structure interaction effect on dynamic behavior of 3 d building frames ...
Soil structure interaction effect on dynamic behavior of 3 d building frames ...
 
Study of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connectorStudy of behaviour of composite beams with truss type shear connector
Study of behaviour of composite beams with truss type shear connector
 
Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...Improving the performance parameters of microstrip patch antenna by using ebg...
Improving the performance parameters of microstrip patch antenna by using ebg...
 

Similar to Implementation of hummingbird cryptographic algorithm for low cost rfid tags using labview

Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
eSAT Publishing House
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
IJERA Editor
 
H42054550
H42054550H42054550
H42054550
IJERA Editor
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
IJNSA Journal
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
eSAT Journals
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
eSAT Publishing House
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
ijcisjournal
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
IJERA Editor
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
eSAT Journals
 

Similar to Implementation of hummingbird cryptographic algorithm for low cost rfid tags using labview (20)

Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographicImplementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
H42054550
H42054550H42054550
H42054550
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
A vlsi implementation of a resource efficient and secure architecture of a b...
A vlsi implementation of a resource efficient and secure architecture of  a b...A vlsi implementation of a resource efficient and secure architecture of  a b...
A vlsi implementation of a resource efficient and secure architecture of a b...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Survey on information sharing
Survey on information sharingSurvey on information sharing
Survey on information sharing
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
shubhamsaraswat8740
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptxEV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
nikshimanasa
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 

Recently uploaded (20)

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptxEV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 

Implementation of hummingbird cryptographic algorithm for low cost rfid tags using labview

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 381 IMPLEMENTATION OF HUMMINGBIRD CRYPTOGRAPHIC ALGORITHM FOR LOW COST RFID TAGS USING LABVIEW Suresh.N1 , Arun prasad.J2 , Raj pritha.P.V.G3 1, 2 Assistant professor, 3 M.E, Prathyusha institute of technology and management, Thiruvallur, Tamil Nadu, India suresh.aeme@gmail.com, Jarunprasad06@gmail.com, rajprithame@gmail.com Abstract Hummingbird is a novel Ultra-light weight cryptographic encryption scheme used for RFID applications of privacy-preserving identification and mutual authentication protocols, motivated by the well known enigma machine. Hummingbird is expected to meet the stringent response time and power consumption requirements which can provide the designed security with a small block size.This algorithm is shown as it is resistant to the most common attacks like linear and differential cryptanalysis.Some properties for integrating this algorithm into a privacy identification and mutual authentification protocol is investicated.This is implemented using the LABVIEW software. Keywords: privacy-preserving identification,mutual authentication protocols,lightweight cryptography scheme. -----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Automatic object identification is now possible by a technology called Radio Frequency Identification (RFID).RFID tag is a small transponder in a RFID system,used to label each object.Radio frequency queries can be received and responded using tranciever,called RFID reader.RFID is a tiny integrated circuit which is used for storing,processing informations for identification and also radio antenna for wireless data transmissions.Animal identification,Point-of-sales,inventory management are the applications for low-cost and low-power tags. This lowcost RFID systems for object identification without any physical contact, RFID tags and RFID reader communication also have a number of security problems.Its easy for an adversary to obtain sensitive information,since ther is no mutual authentication in today’s RFID systems.By linking two different sightings of the same RFID tag an adversary can easily trace a person carrying a tagged item.Unprotected wireless communication will have many issues between FRID tags and readers. 2. HUMMINGBIRD ENCRYPTION Inorder to overcome this security issues a new algorithm called Hummingbird algorithm have been designed as mutual authentication algorithm.which is a combination of both block cipher and stream cipher,this is designed with a small block size and expected to meet stringent response time and power consumption. This consists of 16-bit block size,256-bit key size and 80-bit internal state where the key size provides security for various RFID applications. 2.1. Encryption and Decryption The structure of the Hummingbird algorithm consists of four 16-bit block ciphersEK1,EK2,EK3 and EK4,four 16-bit internal state registers RS1,RS2,RS3 and RS4,and a 16-stage LFSR.The secret key is 256-bit which is divided into four 64- bit subkeys k1, k2,k3 and k4,they can be used in four block ciphers.In the encryption process a 16-bit plaintext PTi is executed by modulo 216 addition of PTiand the first internal state register RS1.The result of this block is then encrypted by the first block cipher CTi.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 382 Fig 1. Encryption Process Fig 2. Decryption Process This procedure is repeated for three times and the output of EK4 is the ciphertext CTi.LFSR is used for updating the internal state registers.The reverse process is done in the Decryption block. 2.2. 16 bit Block Cipher Four 16-bit block ciphers are used in a consecutive manner.Substituition and Permutation(SP) network forms the 16-bit block cipher,with 16-bit block size and 64-bit key size.SP consists of three steps,first key mixing where 16-bit block ciphers uses exclusive or operation for implementation in hardware and software,second a substituition layer with 4- inputs and 4-ouputs of serpent type s-boxes and third a permutation layer.the linear form of 16-bit block cipher is given by,L: {0,1}16 → {0,1}16 defined as, L(m)=m⊕(m«6)⊕(m«10), where m=m0,m1 … , m15,is a 16-bit block data. 2.3. Features of S-Boxes Inorder to reduce the area and power consumption the four s- boxes are reduced into a single s-box and where it is repeated four times in a 16-bit block cipher. Four s-boxes in hexadecimal notation:
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 383 3. SECURITY ANALYSIS OF HUMMINGBIRD Hummingbird is considered as a finite state machine because it’s a hybrid mode of block and stream cipher where the value of LFSR does not depend on the internal states.Hummingbird algorithm is resistant to the following attacks they are Birthday attacks,Differential cryptanalysis,Linear cryptanalysis,Structural attacks,Algebraic attack and cube attacks. 4. HUMMINGBIRD MUTUAL AUTHENTICATION PROTOCOL The hummingbird mutual authentication protocol is mainly for establishing the trust relationship between the RFID tags and the reader,consider RFID system consists of a reader and N RFID tags,where a unique 256-bit key with each tag is shared by the reader.The following three phases are included in the hummingbird mutual authentication protocol. i)Phase 1:Privacy Preserving Tag Identification: In this phase the reader will determine the correct key shared with a tag it is communicating with without exposing the tag’s identity to the adversaries by performing a private identification procedure[12]. ii)Phase 2: Mutual Authentication between a Reader and a Tag: In this phase the reader and the tag authenticate with each other. iii)Phase 3:Command Execution: In this phase the command issued and authenticated by the reader is received and executed only by the encryption RFID tag. 4.1.Output CONCLUSIONS This Hummingbird cryptographic algorithm is implemented using the LABVIEW software,where the encryption and decryption blocks are also designed and the output is generated.The hummingbird 2 algorithm is compared in the future. REFERENCES [1]. R. Anderson, E. Biham, and L. Knudsen, “Serpent: A Proposal for the Advanced Encryption Standard", available at http://www.cl.cam.ac.uk/~rja14/Papers/ serpent .pdf. [2]. E. Biham, “Cryptanalysis of Multiple Modes of Operation", J. Cryptology 11(1), pp. 45-58, 1998. [3]. E. Biham, “Cryptanalysis of Triple Modes of Operation", J. Cryptology 12(3), pp. 161-184, 1999. [4]. E. Biham and L. R. Knudsen, “Cryptanalysis of the ANSI X9.52 CBCM Mode", J. Cryptology 15(1), pp. 47-59, 2002. [5]. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. [6]. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher", The 9th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2007, LNCS 4727, P. Paillier and I.Verbauwhede (eds.), Berlin, Germany: Springer-Verlag, pp. 450-466, 2007. [7]. I. Dinur and A. Shamir, “Cube Attacks on Tweakable Black Box Polynomials", Advances in Cryptology -
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 384 EUROCRYPT 2009, LNCS 5479,A. Joux (ed.), Berlin, Germany: Springer-Verlag, pp. 278-299, 2009. [8]. EPCglobal, Inc., http://www.epcglobalinc.org/, 2005. [9]. M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, “Strong Authentication for RFID Systems Using the AES Algorithm", The 6th International Workshop on Cryptographic Hardware and Embedded Systems- CHES 2004, LNCS 3156, M. Joye and J.-J. Quisquater (eds.), Berlin, Germany: Springer-Verlag, pp.357-370, 2004. [10]. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, “AES Implementation on a Grain of Sand", IEE Proceedings Information Security, vol. 15, no. 1, pp. 13-20, 2005. [11]. P. HÄamÄalÄainen, T. Alho, M. HÄannikÄainen, and T. D. HÄamÄalÄainen,”Design and Implementation of Low- Area and Low-Power AES Encryption Hardware Core", The 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools - DSD 2006, pp. 577-583, IEEE Computer Society, 2006. [12]. International Organization for Standardization, ISO/IEC 9782-2: Information Technology { Security Techniques { Entity Authentication Mechanisms Part 2: Entity Authentication using Symmetric Techniques, 1993. [13]. T. Jakobsen and L. Knudsen, “The Interpolation Attack on Block Ciphers", The 4th Annual Fast Software Encryption Workshop - FSE 1997, LNCS 1267, E. Biham (ed.), Berlin, Germany: Springer-Verlag, pp. 28-40, 1997. [14]. X. Lai, “Higher Order Derivatives and Differential Cryptanalysis", Proceedings of Symposium on Communication, Coding and Cryptography, in honor of James L. Massey on the occasion of his 60th birthday, 1994. [15]. G. Leander, C. Paar, A. Poschmann, and K. Schramm, “New Lightweight DES Variants", The 14th Annual Fast Software Encryption Workshop - FSE 2007, LNCS 4593, A. Biryukov (ed.), Berlin, Germany: Springer-Verlag, pp. 196- 210, 2007. [16]. G. Leander and A. Poschmann, “On the Classi¯cation of 4 Bit S-Boxes", The 1st International Work-shop on the Arithmetic of Finite Fields - WAIFI 2007, LNCS 4547, C. Carlet and B. Sunar (eds.), Berlin, Germany: Springer-Verlag, pp. 159-176, 2007. [17]. M. Matsui, “Linear Cryptanalysis Method for DES Cipher", Advances in Cryptology - EURO-CRYPT'93, LNCS 765, T. Helleseth (ed.), Berlin, Germany: Springer-Verlag, pp. 386-397, 1993. [18]. C. Rolfes, A. Poschmann, G. Leander, and C. Paar, “Ultra-Lightweight Implementations for Smart Devices- Security for 1000 Gate Equivalents", The 8th Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, LNCS 5189, G. Grimaud and F.-X. Standaert (eds.), Berlin, Germany: Springer-Verlag, pp. 89-103, 2008. [19]. D.Wagner, “Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation", The 5th Annual Fast Software Encryption Workshop - FSE 1998, LNCS 1372, S. Vaudenay (ed.), Berlin, Germany