Abstract
Pseudorandom number generators play an important role to provide security and privacy on radio frequency identification (RFID) tags. In particular, the EPC Class 1 Generation 2 (EPC C1 Gen2) standard uses a pseudorandom number generator in the tag identification protocol. In this paper, we first present a pseudorandom number generator, named the filtering nonlinear feedback shift register using Welch-Gong (WG) transformations (filtering WG-NLFSR) and the filtering WG7-NLFSR for EPC C1 Gen2 RFID tags. We then investigate the periodicity of a sequence generated by the filtering WG-NLFSR by considering the model, named nonlinear feedback shift registers using Welch-Gong (WG) transformations (WG-NLFSR). The periodicity of WG-NLFSR sequences is investigated in two ways. Firstly, we perform the cycle decomposition of WG-NLFSR recurrence relations over different finite fields by computer simulations where the nonlinear recurrence relation is composed of a characteristic polynomial and a WG transformation module. Secondly, we conduct an empirical study on the period distribution of the sequences generated by the WG-NLFSR. The empirical study states that a sequence with period bounded below by the square root of the maximum period can be generated by the WG-NLFSR with high probability for any initial state.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Che, W., Deng, H., Tan, X., Wang, J.: A Random Number Generator for Application in RFID Tags. In: Networked RFID Systems and Lightweight Cryptography, ch. 16, pp. 279–287. Springer (2008)
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)
EPCglobal. EPC Radio-Frequency Identification Protocol Class-1 Generation-2 UHF RFID for Communication at 860-960 MHz (2008), http://www.epcglobalinc.org/
The eStream Project, http://www.ecrypt.eu.org/stream/
Golomb, S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1981)
Golomb, S.W., Gong, G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004)
Gong, G., Rønjom, S., Helleseth, T., Hu, H.: Fast Discrete Fourier Spectra Attacks on Stream Ciphers. IEEE Transactions on Information Theory 57(8), 5555–5565 (2011)
Gong, G., Youssef, A.: Cryptographic Properties of the Welch-Gong Transformation Sequence Generators. IEEE Transactions on Information Theory 48(11), 2837–2846 (2002)
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications (J-SAC) 24(2), 381–394 (2006)
Lam, C., Aagaard, M., Gong, G.: Hardware Implementations of Multi-output Welch-Gong Ciphers, CACR Technical Report (2011), http://www.cacr.math.uwaterloo.ca/
Luo, Y., Chai, Q., Gong, G., Lai, X.: WG-7: A Lightweight Stream Cipher with Good Cryptographic Properties. In: IEEE Global Communications Conference –GLOBECOM 2010, pp. 1–6 (2010)
Mandal, K., Fan, X., Gong, G.: Warbler: A Lightweight Pseudorandom Number Generator for EPC Class 1 Gen 2 RFID Tags. In: Radio Frequency Identification System Security: RFIDsec 2011 Asia Workshop Proceedings (Cryptology and Information Security), November 7-8 (2012)
Melia-Segui, J., Garcia-Alfaro, J., Herrera-Joancomarti, J.: Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 34–46. Springer, Heidelberg (2010)
Meier, W., Staffelbach, O.: Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, 159–176 (1989)
Nawaz, Y., Gong, G.: WG: A Family of Stream Ciphers with Designed Randomness Properties. Information Science 178(7), 1903–1916 (2008)
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification. Computer Standard Interfaces 31, 88–97 (2009)
Ranasinghe, D.C., Cole, P.H.: An Evaluation Framework. In: Networked RFID Systems and Lightweight Cryptography, pp. 157–167. Springer (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Mandal, K., Gong, G. (2013). Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)