IOP Conference Series: Materials Science and Engineering
PAPER • OPEN ACCESS
Authentication Security in Radio Frequency Identification with IDEA Algorithm To cite this article: H Nurdiyanto et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 384 012042
View the article online for updates and enhancements.
This content was downloaded from IP address 158.46.155.70 on 12/07/2018 at 13:31
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
Authentication Security in Radio Frequency Identification with IDEA Algorithm H Nurdiyanto1, R Rahim2,*, R Hidayat3, P Harliana4, G Gunawan5, H A Adam5, Y Sonatha3 and M Azmi3 1
Department of Informatics Engineering, STMIK Dharma Wacana, Metro Lampung, Indonesia 2 School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia 3 Department Information Technology, Politeknik Negeri Padang, Padang, Indonesia 4 Department of Informatics Engineering, Sekolah Tinggi Teknik Harapan, Medan, Indonesia 5 Department of Computer Engineering and Informatics, Politeknik Negeri Medan, Medan, Indonesia *
[email protected] Abstract. Data security on Radio Frequency Identification (RFID) cards for parking security applications need to be applied for more protection especially information on RFID cards, as well as to improve security on RFID access authentication and verification using cryptography algorithm, one of the algorithms that can be used for authentication and verification in RFID communication process is International Data Encryption Algorithm (IDEA) algorithm, the results obtained that the data security on RFID can work well.
1. Introduction Radio Frequency Identification (RFID) [1] is an object identification method by utilizing radio waves using RFID Reader and RFID Transponder (RFID tag) where each RFID Tag has a different Identification number [1, 2], RFID has widely used in various activities such as attendance, passport, grocery store [3], E-Toll and also for parking at malls or companies. RFID is not a perfect technology and certainly has a weakness [4] and even the information contained in RFID tags can be taken by irresponsible [5], it could happen because most RFID Tag data stored in text form that is easy to read when RFID Tag is scanned [5], there are many ways can use to avoiding the scanning process on RFID Tags such as metal or aluminum foil [5] but that also does not guarantee data on RFID Tags cannot be taken, another solution is to secure data available on RFID Tag by using cryptography [6-8] techniques. IDEA [9-11] is one of block cipher cryptography algorithm that operates on 64 bit plaintext block and 128 bit key length [9, 12], one of IDEA algorithm difference with other algorithm is IDEA algorithm using confusion and diffusion technique for encryption process so the result do not have exact pattern, for data security experiments on RFID using IDEA algorithm require some tools such as ARDUINO UNO R3 and Micro Controller ATMega328 [13] whereas for RFID Tags using Mifare S50 RFID card as well as IDEA algorithm implement on RFID Tag, the implementation of IDEA algorithm in RFID Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by IOP Publishing Ltd 1
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
doesn’t guarantee data cannot be taken, but it can definitely make it difficult for irresponsible parties to reading the data [14]. 2. Material and method RFID Tag data security can be applying in any cases such as attendance, E-Toll, Identification Card, Parking, etc., and for this experiment, the application of security with IDEA algorithm on RFID Tag is made for consumer data self-service parking, implementation of IDEA and RFID algorithm in the picture below:
Figure 1. Unique code (cipher text) writing to RFID tag. Figure 1 shows the process of writing data into RFID Tags where the data in the form of ID card and Vehicle Plates are converted into cipher text form by using IDEA algorithm before written to RFID Tag, and then stored in database, for process of reading data contained in RFID Tag can be seen in Figure 2 of the following:
Figure 2. Read and decryption unique code (cipher text) in RFID tag.
2
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
Figures one and two above are the flow of the process writing and reading data contained in RFID where information in the form of cipher text encrypted by using IDEA algorithm, for this experiment the use of RFID module looks like in Figure 3 below:
(a)
(c)
(b)
Figure 3. RFID module MFRC522 (a), Mifare S50 tag RFID (b), Arduino uno R3 (c). RFID Module MFRC522 is used as a unique code reader stored in tag cards using Mifare S50 RFID Card while Arduino Uno R3 is used as a connecting board between RFID reader with the host computer as well as RFID reader with Mifare S50 card (RFID tag) and also for writing unique code into RFID tag. Data security on RFID Tags by using IDEA algorithm has some function such as: Key generation The formation process begins by dividing 128-bit keys into eight pieces of 16-bit sub-key [9, 10], see Figure 4 below: Key Input 128 bit
Grouped into 8 subkeys with 16 bits long.
k1 … k128
K1 K2 K3 K4 K5 K6 Round 1 K1 K2 K3 K4 K5 K6
Turn Left 25 bit
K7 K8 Round 2 K1 K2
Grouped into 8 subkeys with 16 bits long
k1 … k128
K1 K2 K3 K4 Round 2 K3 K4 K5 K6
o o o
K5 K6 K7 K8 Round 3 K1 K2 K3 K4
Turn Left 25 bit
Grouped into 8 subkeys with 16 bits long
k1 … k128
The last 4 subkeys are not used. K1 K2 K3 K4
K5 K6 K7 K8
Transformasi Output
K1 K2 K3 K4
Figure 4. Key generation.
3
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
Encryption and decryption Split 64-bit plaintext into four sub-blocks with 16 bits long, i.e., X1, X2, X3, X4 as the first-phase iteration, and there are eight iterations, at each iteration, four sub-blocks are XOR-aligned, added, multiplied with six 16-bit sub-key, for detail see Figure 5 below: X1
X2
K1(1)
X3 K2(1)
X4
K3(1)
K4(1)
K5(1) One Round K6(1)
o o o
Seven Round
K1(9)
K2(9) Y1
Y2
K3(9)
Transformation Output
K4(9) Y3
Y4
Figure 5. Key encryption and decryption process. 3. Results and discussion Experiments Data security in RFID tags are made step by step so the writing, reading and encryption process can be known step by step, and for RFID modules that have been assembled could see in Figure 6 below:
(a)
(b) Figure 6. Arduino uno assembled results with RFID reader (a), RFID reader connection with computer (b). For example, data security performed on the number of vehicle plates that enter into the parking area, for testing the encryption with IDEA algorithm as in the process below:
4
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
Plaintext = BK4087AE Key = robbirahimkeeren The encryption process with the IDEA algorithm consists of 8 rounds with each round having a relatively long process, for example, iteration one and two as below: FIRST ROUND ITERATION 01) L#1 = (X1 * K1) mod (2^16 + 1) = 424B * 726F mod (2^16 + 1) = 06E3 02) L#2 = (X2 + K2) mod 2^16 = 3430 + 6262 mod 2^16 = 9692 SECOND ROUND ITERATION 01) L#1 = (X1 * K1) mod (2^16 + 1) = 314E * 6572 mod (2^16 + 1) = A733 02) L#2 = (X2 + K2) mod 2^16 = 9604 + 656E mod 2^16 = FB72 The round process is performed as much as eight rounds to get the output transformation as below: TRANSFORMATION 01) 02) 03) 04)
Y1 = (X1 * K1) mod (2^16 + 1) = FDF0 * 989A mod (2^16 + 1) = AB02 Y2 = (X2 + K2) mod 2^16 = 0CF6 + 5C98 mod 2^16 = 698E Y3 = (X3 + K3) mod 2^16 = 9A99 + 5A1A mod 2^16 = F4B3 Y4 = (X4 * K4) mod (2^16 + 1) = 861F * 5B5A mod (2^16 + 1) = FC0B
Ciphertext: Y1 = AB02 = « Y2 = 698E = iŽ Y3 = F4B3 = ô³ Y4 = FC0B = ü Cipher text = «iŽô³ü The cipher text writes into RFID Tag and then if the irresponsible party takes cipher text in RFID Tag then the party take a long time to decipher, data security on RFID Tags does not guarantee the data is safe from irresponsible parties but can make it difficult to read it. 4. Conclusions The IDEA cryptographic algorithm can be used well to secure data on RFID Tags so that RFID data is increasingly difficult to know by irresponsible parties, then the use of ARDUINO, MFRC522 and Mifare S50 modules of RFID tags as a tool to test the use of writing and reading on RFID can be well used, for the next development of security is not only limited to the data on RFID Tag but also can do the encryption on the frequency of electromagnetic waves that exist in RFID. References [1] Want R 2006 An introduction to RFID technology IEEE Pervasive Computing 5(1) p. 25–33. [2] Nambiar A N 2009 RFID technology: a review of its applications Proc. World Congr. Eng. Comput. Sci. 2 p. 20–22. [3] Garrido Azevedo S and Carvalho H 2012 Contribution of RFID technology to better management of fashion supply chains Int. J. Retail Distrib. Manag. 40(2) p. 128–156. [4] Kaur M, Sandhu M, Mohan N and Sandhu P S RFID Technology Principles, Advantages, Limitations & Its Applications Int. J. Comput. Electr. Eng. 3(1) p. 1793–8163.
5
International Symposium on Materials and Electrical Engineering (ISMEE) 2017 IOP Publishing IOP Conf. Series: Materials Science and Engineering 384 (2018) 012042 doi:10.1088/1757-899X/384/1/012042 1234567890‘’“”
[5] [6] [7] [8] [9] [10] [11] [12] [13] [14]
Randall A 2017 RFID Can Be Hacked: Here’s How, & What You Can Do To Stay Safe [Online] Available: http://www.makeuseof.com/tag/rfid-hacked-stay-safe/. [Accessed: 03-Sep-2017]. Hariyanto E and Rahim R 2016 Arnold’s Cat Map Algorithm in Digital Image Encryption Int. J. Sci. Res. 5(10) p. 1363–1365. Rahim R and Ikhwan A 2016 Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher Int. J. Sci. Res. Sci. Technol. 2(6) p. 71–78. Rahim R and Ikhwan A 2016 Study of Three Pass Protocol on Data Security Int. J. Sci. Res. 5(11) p. 102–104. Almasri O and Jani H M 2013 Introducing an Encryption Algorithm based on IDEA 2(9) p. 334– 339. Ludwig G A and Alegre P 2007 International Data Encryption Algorithm (IDEA) 8(1) p. 6–11. Singh H P, Verma S and Mishra S 2013 Secure-International Data Encryption Algorithm Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 2(2) p. 780–792. Chen J, Xue D and Lai X 2008 An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis Wuhan Univ. J. Nat. Sci. 13(6) p. 697–701. Ansari A N, Navada A, Agarwal S, Patil S and Sonkamble B A 2011 Automation of attendance system using RFID, biometrics, GSM modem with .Net framework 2011 International Conference on Multimedia Technology, ICMT 2011 p. 2976–2979. Boyle R J, Challa C D and Clements J A 2017 Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength J. Inf. Priv. Secur. 13(3) p. 137–156.
6