Z. Jeddi. International Journal on Cryptography and Information Security (IJCIS), 4 (1):
13-29(March 2014)
DOI: 10.5121/ijcis.2014.4102
Abstract
In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The implementation comparison of this algorithm with other algorithms confirms that it a good candidate for resource-constraint devices such as RFID systems and wireless sensors.
%0 Journal Article
%1 jeddinovel
%A Jeddi, Zahra
%D 2014
%E Shawon, S.M.Rahman
%J International Journal on Cryptography and Information Security (IJCIS)
%K RFID systems
%N 1
%P 13-29
%R 10.5121/ijcis.2014.4102
%T A Novel Authenticated Cipher for RFID Systems
%U https://wireilla.com/ijcis/vol4.html
%V 4
%X In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The implementation comparison of this algorithm with other algorithms confirms that it a good candidate for resource-constraint devices such as RFID systems and wireless sensors.
@article{jeddinovel,
abstract = {In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The implementation comparison of this algorithm with other algorithms confirms that it a good candidate for resource-constraint devices such as RFID systems and wireless sensors.
},
added-at = {2018-11-28T11:48:52.000+0100},
author = {Jeddi, Zahra},
biburl = {https://www.bibsonomy.org/bibtex/2c56a3e7b7e5783d6ef1d1cb8eed23705/alinta},
doi = {10.5121/ijcis.2014.4102},
editor = {Shawon, S.M.Rahman},
interhash = {467f2f8f8e5e5a328cf1edf579fa86e4},
intrahash = {c56a3e7b7e5783d6ef1d1cb8eed23705},
issn = {18398626},
journal = {International Journal on Cryptography and Information Security (IJCIS)},
keywords = {RFID systems},
language = {English},
month = mar,
number = 1,
pages = {13-29},
timestamp = {2018-11-28T11:48:52.000+0100},
title = {A Novel Authenticated Cipher for RFID Systems},
url = {https://wireilla.com/ijcis/vol4.html},
volume = 4,
year = 2014
}