Abstract

Radio Frequency Identification (RFID) technology is widely utilized by businesses, organizations and wireless communication systems. RFID technology is secured using different ways of data encryption, e.g., Advanced Encryption Standard (AES). The Substitution Box (S-Box) is the core of AES. In this paper, a new algorithm is proposed to generate a modified S-Box with new keys, specifically a key and plaintext-dependent S-Box using an improved RC4 encryption algorithm with Logistic Chaotic Maps (LCM). The strength of the proposed S-Box is tested throughout the paper, and compared against the state-of-the-art S-Box implementations, namely, the static S-Box, dynamic S-box, KSA and PRGA S-Box, and RC4 S-Boxes with Henon chaotic maps. The comparison between the state-of-the-art S-Boxes and the proposed S-Box demonstrates that the use of the Logistic Chaotic Map increases the security of the S-Box and makes the differential and linear cryptography more sturdy. In particular, using the strict avalanche test, we demonstrate that the proposed S-Box improves the security by achieving a cipher text bit-flip ratio of 0.4765, which is closer to 0.5 (where half the bits are flipped), while maintaining a minimum elapsed time of 19 milliseconds for encryption and decryption.

Highlights

  • Radio Frequency Identification (RFID) technology is an automatic identification technology that uses radio waves to identify the path, organize and wirelessly discover a variety of objects as individuals, carriage, commodity, and property [1,2,3,4]

  • In our paper, we propose a new encryption algorithm to generate new S-box used in data encryption

  • With Logistic Chaotic Map) to generate new S-box used in data encryption

Read more

Summary

Introduction

Radio Frequency Identification (RFID) technology is an automatic identification technology that uses radio waves to identify the path, organize and wirelessly discover a variety of objects as individuals, carriage, commodity, and property [1,2,3,4]. In some previous studies [4,5], RFID technology used the coding techniques as Data Encryption Standard (DES) and conjoined the Advanced Encryption Standard (AES) for information security. RFID systems have been enhanced by adopting the ways to secure the transferred data by safe encoding measures within the affordable RFID systems and to standardize the cryptography [6,7]. The two major classes of cryptosystems are asymmetric and symmetric keys. The stream cipher and block cipher are the two divisions of the symmetric key [8,9]. The Substitution Box (S-Box) is one of the foremost important parts and is the solely nonlinear component reassuring the confusion

Objectives
Methods
Results
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call