The Hummingbird-2 Lightweight Authenticated Encryption Algorithm View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Daniel Engels , Markku-Juhani O. Saarinen , Peter Schweitzer , Eric M. Smith

ABSTRACT

Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it’s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the previous version of the cipher, and in response to extensive analysis, the internal state has been increased to 128 bits and a flow of entropy from the state to the mixing function has been improved. In this paper we present the Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol. More... »

PAGES

19-31

References to SciGraph publications

Book

TITLE

RFID. Security and Privacy

ISBN

978-3-642-25285-3
978-3-642-25286-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-25286-0_2

DOI

http://dx.doi.org/10.1007/978-3-642-25286-0_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1032149585


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX\u00a075001, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Engels", 
        "givenName": "Daniel", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX\u00a075001, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Saarinen", 
        "givenName": "Markku-Juhani O.", 
        "id": "sg:person.015402743643.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015402743643.85"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX\u00a075001, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schweitzer", 
        "givenName": "Peter", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX\u00a075001, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Smith", 
        "givenName": "Eric M.", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/978-3-540-28628-8_1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003364452", 
          "https://doi.org/10.1007/978-3-540-28628-8_1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-21702-9_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1010028546", 
          "https://doi.org/10.1007/978-3-642-21702-9_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-21702-9_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1010028546", 
          "https://doi.org/10.1007/978-3-642-21702-9_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-25937-4_7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1010184708", 
          "https://doi.org/10.1007/978-3-540-25937-4_7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-25937-4_7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1010184708", 
          "https://doi.org/10.1007/978-3-540-25937-4_7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-39887-5_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035298156", 
          "https://doi.org/10.1007/978-3-540-39887-5_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-39887-5_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035298156", 
          "https://doi.org/10.1007/978-3-540-39887-5_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48285-7_33", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038500879", 
          "https://doi.org/10.1007/3-540-48285-7_33"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-73074-3_13", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039471735", 
          "https://doi.org/10.1007/978-3-540-73074-3_13"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-73074-3_13", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039471735", 
          "https://doi.org/10.1007/978-3-540-73074-3_13"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-14992-4_2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045651226", 
          "https://doi.org/10.1007/978-3-642-14992-4_2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-14992-4_2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045651226", 
          "https://doi.org/10.1007/978-3-642-14992-4_2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://app.dimensions.ai/details/publication/pub.1047747404", 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4613-9314-6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047747404", 
          "https://doi.org/10.1007/978-1-4613-9314-6"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4613-9314-6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047747404", 
          "https://doi.org/10.1007/978-1-4613-9314-6"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-04138-9_20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049385172", 
          "https://doi.org/10.1007/978-3-642-04138-9_20"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-01001-9_16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052713322", 
          "https://doi.org/10.1007/978-3-642-01001-9_16"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-01001-9_16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052713322", 
          "https://doi.org/10.1007/978-3-642-01001-9_16"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it\u2019s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the previous version of the cipher, and in response to extensive analysis, the internal state has been increased to 128 bits and a flow of entropy from the state to the mixing function has been improved. In this paper we present the Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol.", 
    "editor": [
      {
        "familyName": "Juels", 
        "givenName": "Ari", 
        "type": "Person"
      }, 
      {
        "familyName": "Paar", 
        "givenName": "Christof", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-25286-0_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-25285-3", 
        "978-3-642-25286-0"
      ], 
      "name": "RFID. Security and Privacy", 
      "type": "Book"
    }, 
    "name": "The Hummingbird-2 Lightweight Authenticated Encryption Algorithm", 
    "pagination": "19-31", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-25286-0_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "992789bf5256373dc101e3bade01458327406b9c1b6c6ac76bfaa5b91186ad4d"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1032149585"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-25286-0_2", 
      "https://app.dimensions.ai/details/publication/pub.1032149585"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T17:14", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000263.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-642-25286-0_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25286-0_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25286-0_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25286-0_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25286-0_2'


 

This table displays all metadata directly associated to this object as RDF triples.

135 TRIPLES      23 PREDICATES      38 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-25286-0_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N1ac4468d6ed94d119bd43362ef07be2e
4 schema:citation sg:pub.10.1007/3-540-48285-7_33
5 sg:pub.10.1007/978-1-4613-9314-6
6 sg:pub.10.1007/978-3-540-25937-4_7
7 sg:pub.10.1007/978-3-540-28628-8_1
8 sg:pub.10.1007/978-3-540-39887-5_24
9 sg:pub.10.1007/978-3-540-73074-3_13
10 sg:pub.10.1007/978-3-642-01001-9_16
11 sg:pub.10.1007/978-3-642-04138-9_20
12 sg:pub.10.1007/978-3-642-14992-4_2
13 sg:pub.10.1007/978-3-642-21702-9_19
14 https://app.dimensions.ai/details/publication/pub.1047747404
15 schema:datePublished 2012
16 schema:datePublishedReg 2012-01-01
17 schema:description Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it’s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the previous version of the cipher, and in response to extensive analysis, the internal state has been increased to 128 bits and a flow of entropy from the state to the mixing function has been improved. In this paper we present the Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol.
18 schema:editor N7c688538a5eb4dabb5a0ae310e5d7b51
19 schema:genre chapter
20 schema:inLanguage en
21 schema:isAccessibleForFree true
22 schema:isPartOf N1eea11a2e2b6491abb87dcdf02630df9
23 schema:name The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
24 schema:pagination 19-31
25 schema:productId Naee0ec72dd434f15a3e690ddcab6c59d
26 Nc13d5099e5284292be6160f800052af5
27 Nfabb0bad3ffd4b58b6e2c316b04d9d70
28 schema:publisher N6afd582d33c146c7820e09c669e6b8b4
29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032149585
30 https://doi.org/10.1007/978-3-642-25286-0_2
31 schema:sdDatePublished 2019-04-15T17:14
32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
33 schema:sdPublisher N07cf37bcec2e443faf3b8375bc740e0c
34 schema:url http://link.springer.com/10.1007/978-3-642-25286-0_2
35 sgo:license sg:explorer/license/
36 sgo:sdDataset chapters
37 rdf:type schema:Chapter
38 N00979d1c1eda4871b7ad014f42d0b45d schema:name Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA
39 rdf:type schema:Organization
40 N07cf37bcec2e443faf3b8375bc740e0c schema:name Springer Nature - SN SciGraph project
41 rdf:type schema:Organization
42 N0e8cf7aba2414ccab6a0709cdba305c1 schema:affiliation Nb9c605b3046942049996071bade79555
43 schema:familyName Schweitzer
44 schema:givenName Peter
45 rdf:type schema:Person
46 N1ac4468d6ed94d119bd43362ef07be2e rdf:first Nea061d3b92ef43f38504d02b20554a8d
47 rdf:rest N8ed8d817bae847f9bc1c8363102176e7
48 N1eea11a2e2b6491abb87dcdf02630df9 schema:isbn 978-3-642-25285-3
49 978-3-642-25286-0
50 schema:name RFID. Security and Privacy
51 rdf:type schema:Book
52 N5ae4bc08980d416f8114aee2788baf2d schema:familyName Paar
53 schema:givenName Christof
54 rdf:type schema:Person
55 N5c088d44053844dfa7bc95cccc26dc8f schema:name Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA
56 rdf:type schema:Organization
57 N6afd582d33c146c7820e09c669e6b8b4 schema:location Berlin, Heidelberg
58 schema:name Springer Berlin Heidelberg
59 rdf:type schema:Organisation
60 N6d792134a90d4798b85fd082c822ad02 rdf:first Nabf1d1ff5f0e4736a98ad023d1d9bdaf
61 rdf:rest rdf:nil
62 N7292d11dffdd436a966f748611549c5d rdf:first N0e8cf7aba2414ccab6a0709cdba305c1
63 rdf:rest N6d792134a90d4798b85fd082c822ad02
64 N7b5075225dd74508b9bd54c1046b8360 schema:name Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA
65 rdf:type schema:Organization
66 N7c688538a5eb4dabb5a0ae310e5d7b51 rdf:first Nb7a59f526191460b9d8a0e2e9d6cfb3c
67 rdf:rest Na6258e5c0fc04fa08be46a070e41e58d
68 N8ed8d817bae847f9bc1c8363102176e7 rdf:first sg:person.015402743643.85
69 rdf:rest N7292d11dffdd436a966f748611549c5d
70 Na6258e5c0fc04fa08be46a070e41e58d rdf:first N5ae4bc08980d416f8114aee2788baf2d
71 rdf:rest rdf:nil
72 Nabf1d1ff5f0e4736a98ad023d1d9bdaf schema:affiliation N7b5075225dd74508b9bd54c1046b8360
73 schema:familyName Smith
74 schema:givenName Eric M.
75 rdf:type schema:Person
76 Naee0ec72dd434f15a3e690ddcab6c59d schema:name readcube_id
77 schema:value 992789bf5256373dc101e3bade01458327406b9c1b6c6ac76bfaa5b91186ad4d
78 rdf:type schema:PropertyValue
79 Nb7a59f526191460b9d8a0e2e9d6cfb3c schema:familyName Juels
80 schema:givenName Ari
81 rdf:type schema:Person
82 Nb9c605b3046942049996071bade79555 schema:name Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA
83 rdf:type schema:Organization
84 Nc13d5099e5284292be6160f800052af5 schema:name doi
85 schema:value 10.1007/978-3-642-25286-0_2
86 rdf:type schema:PropertyValue
87 Nea061d3b92ef43f38504d02b20554a8d schema:affiliation N00979d1c1eda4871b7ad014f42d0b45d
88 schema:familyName Engels
89 schema:givenName Daniel
90 rdf:type schema:Person
91 Nfabb0bad3ffd4b58b6e2c316b04d9d70 schema:name dimensions_id
92 schema:value pub.1032149585
93 rdf:type schema:PropertyValue
94 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
95 schema:name Information and Computing Sciences
96 rdf:type schema:DefinedTerm
97 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
98 schema:name Data Format
99 rdf:type schema:DefinedTerm
100 sg:person.015402743643.85 schema:affiliation N5c088d44053844dfa7bc95cccc26dc8f
101 schema:familyName Saarinen
102 schema:givenName Markku-Juhani O.
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015402743643.85
104 rdf:type schema:Person
105 sg:pub.10.1007/3-540-48285-7_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038500879
106 https://doi.org/10.1007/3-540-48285-7_33
107 rdf:type schema:CreativeWork
108 sg:pub.10.1007/978-1-4613-9314-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047747404
109 https://doi.org/10.1007/978-1-4613-9314-6
110 rdf:type schema:CreativeWork
111 sg:pub.10.1007/978-3-540-25937-4_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010184708
112 https://doi.org/10.1007/978-3-540-25937-4_7
113 rdf:type schema:CreativeWork
114 sg:pub.10.1007/978-3-540-28628-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003364452
115 https://doi.org/10.1007/978-3-540-28628-8_1
116 rdf:type schema:CreativeWork
117 sg:pub.10.1007/978-3-540-39887-5_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035298156
118 https://doi.org/10.1007/978-3-540-39887-5_24
119 rdf:type schema:CreativeWork
120 sg:pub.10.1007/978-3-540-73074-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039471735
121 https://doi.org/10.1007/978-3-540-73074-3_13
122 rdf:type schema:CreativeWork
123 sg:pub.10.1007/978-3-642-01001-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052713322
124 https://doi.org/10.1007/978-3-642-01001-9_16
125 rdf:type schema:CreativeWork
126 sg:pub.10.1007/978-3-642-04138-9_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049385172
127 https://doi.org/10.1007/978-3-642-04138-9_20
128 rdf:type schema:CreativeWork
129 sg:pub.10.1007/978-3-642-14992-4_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045651226
130 https://doi.org/10.1007/978-3-642-14992-4_2
131 rdf:type schema:CreativeWork
132 sg:pub.10.1007/978-3-642-21702-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010028546
133 https://doi.org/10.1007/978-3-642-21702-9_19
134 rdf:type schema:CreativeWork
135 https://app.dimensions.ai/details/publication/pub.1047747404 schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...