<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Privacy in Location-Based Applications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Preface</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>X. Sean Wang Dep. of C.S. , University of Vermont - 33 Colchester Avenue</institution>
          ,
          <addr-line>Burlington, VT 05405</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2008</year>
      </pub-date>
      <fpage>100</fpage>
      <lpage>141</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Proceedings
Editors’ addresses:</p>
    </sec>
    <sec id="sec-2">
      <title>Claudio Bettini</title>
    </sec>
    <sec id="sec-3">
      <title>D.I.Co. , Universita´ di Milano - Via Comelico 39, I-20135 Milano, Italy</title>
      <p>bettini@dico.unimi.it
Location based applications in travel, logistics, health care, social networks and other
industries already exist and are poised to proliferate. One of the critical issues for a
widespread deployment of these applications is how to conciliate their effectiveness and quality
with privacy concerns. The PiLBA ’08 workshop was intended to bring together scientists
from security and data management to discuss the most recent advances in the field. These
proceedings include the eight contributions on this topic selected from the submissions by
the PC chairs with the help of the members of the program committee, and presented at the
workshop. They include an extended abstract of the invited talk, two survey papers, and
five research papers covering several complementary aspects of privacy in location based
applications and services.</p>
    </sec>
    <sec id="sec-4">
      <title>The Organizing Committee would like to thank all the people that supported and helped in</title>
      <p>the organization of this event. A particular acknowledgment to the PC members, to Javier</p>
    </sec>
    <sec id="sec-5">
      <title>Lopez for his suggestions and support with local organization and to Linda Pareschi for her help with the web site and with the preparation of these proceedings. 3</title>
    </sec>
    <sec id="sec-6">
      <title>Claudio Bettini</title>
    </sec>
    <sec id="sec-7">
      <title>Sushil Jajodia</title>
    </sec>
    <sec id="sec-8">
      <title>Pierangela Samarati</title>
    </sec>
    <sec id="sec-9">
      <title>X. Sean Wang</title>
    </sec>
    <sec id="sec-10">
      <title>October 2008</title>
      <sec id="sec-10-1">
        <title>Organizing Committee</title>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Claudio Bettini - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-12">
      <title>Sushil Jajodia - George Mason University, USA</title>
    </sec>
    <sec id="sec-13">
      <title>Pierangela Samarati - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-14">
      <title>Sean Wang - University of Vermont, USA</title>
      <sec id="sec-14-1">
        <title>Publicity Chair</title>
      </sec>
    </sec>
    <sec id="sec-15">
      <title>Linda Pareschi - Universita´ di Milano, Italy</title>
      <sec id="sec-15-1">
        <title>Programme Committee</title>
      </sec>
    </sec>
    <sec id="sec-16">
      <title>Claudio Agostino Ardagna - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-17">
      <title>Vijay Atluri - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-18">
      <title>Ying Cai - Iowa State University, USA</title>
    </sec>
    <sec id="sec-19">
      <title>Reynold Cheng - University of Hong Kong, China</title>
    </sec>
    <sec id="sec-20">
      <title>Josep Domingo-Ferrer - Rovira i Virgili University, Spain</title>
    </sec>
    <sec id="sec-21">
      <title>Marco Gruteser - Rutgers University, USA</title>
    </sec>
    <sec id="sec-22">
      <title>Urs Hengartner - University of Waterloo, Canada</title>
    </sec>
    <sec id="sec-23">
      <title>Panos Kalnis - National University of Singapore, Singapore</title>
    </sec>
    <sec id="sec-24">
      <title>George Kollios - Boston University, USA</title>
    </sec>
    <sec id="sec-25">
      <title>Ling Liu - Georgia Institute of Technology, USA</title>
    </sec>
    <sec id="sec-26">
      <title>Sergio Mascetti - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-27">
      <title>Dino Pedreschi - Universita´ di Pisa, Italy</title>
    </sec>
    <sec id="sec-28">
      <title>Daniele Riboni - Universita´ di Milano, Italy</title>
    </sec>
    <sec id="sec-29">
      <title>Cyrus Shahabi - University of Southern California, USA</title>
    </sec>
    <sec id="sec-30">
      <title>Heng Xu - Penn State University, USA</title>
    </sec>
    <sec id="sec-31">
      <title>Man Lung Yiu - Aalborg University, Denmark</title>
      <sec id="sec-31-1">
        <title>External Reviewers</title>
      </sec>
    </sec>
    <sec id="sec-32">
      <title>Baik Hoh</title>
    </sec>
    <sec id="sec-33">
      <title>Ali Khoshgozaran</title>
    </sec>
    <sec id="sec-34">
      <title>Houtan Shirani-Mehr</title>
    </sec>
    <sec id="sec-35">
      <title>Xike Xie</title>
    </sec>
    <sec id="sec-36">
      <title>Yan Zhang 4</title>
      <sec id="sec-36-1">
        <title>Invited talk extended abstract: Safety and Privacy in Vehicular Communications</title>
        <p>Josep Domingo-Ferrer and Qianhong Wu</p>
      </sec>
      <sec id="sec-36-2">
        <title>Location Privacy in Location-Based Services: Beyond TTP-based Schemes</title>
        <p>Agusti Solanas, Josep Domingo-Ferrer and Antoni Mart´ınez-Balleste´</p>
      </sec>
      <sec id="sec-36-3">
        <title>Privacy in Georeferenced Context-aware Services: A Survey</title>
        <p>Daniele Riboni, Linda Pareschi and Claudio Bettini</p>
      </sec>
      <sec id="sec-36-4">
        <title>Pattern-Preserving k-Anonymization of Sequences and its Application to Mobility Data Mining</title>
        <p>Ruggero G. Pensa, Anna Monreale, Fabio Pinelli and Dino Pedreschi</p>
      </sec>
      <sec id="sec-36-5">
        <title>On the Impact of User Movement Simulations in the Evaluation of LBS Privacy</title>
      </sec>
      <sec id="sec-36-6">
        <title>Preserving Techniques</title>
        <p>Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang and Sushil Jajodia</p>
      </sec>
      <sec id="sec-36-7">
        <title>A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks</title>
        <p>Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati
and Rhandi Martin</p>
      </sec>
      <sec id="sec-36-8">
        <title>User Privacy in Transport Systems Based on RFID E-Tickets</title>
        <p>Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann</p>
      </sec>
      <sec id="sec-36-9">
        <title>The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and</title>
      </sec>
      <sec id="sec-36-10">
        <title>Benchmarking</title>
        <p>Marcos Simpl´ıcio Jr., Paulo S. L. M. Barreto, Tereza C. M. B. Carvalho, Cintia B.
Margi, and Mats Na¨slund
6
12
24
44
61
82
102
123</p>
        <p>Josep Domingo-Ferrer and Qianhong Wu</p>
        <p>Universitat Rovira i Virgili, UNESCO Chair in Data Privacy, Dept. of Computer
Engineering and Mathematics, Av. Pa¨ısos Catalans 26, E-43007 Tarragona, Catalonia
e-mail {josep.domingo,qianhong.wu}@urv.cat
Abstract. Vehicular ad hoc networks (VANETs) allow vehicles to
disseminate messages about road conditions to other vehicles. As long as
these messages are trustworthy, they can greatly increase traffic safety
and efficiency. Hence, care must be exerted to ensure that vehicle-generated
messages do not convey inaccurate or false content. A natural way to
proceed is to request endorsement by nearby vehicles on the content of a
message originated by a certain vehicle. However, such a message
generation and peer-to-peer endorsement should not result in any privacy
loss on the part of vehicles co-operating in it. We survey the available
solutions to this security-privacy tension and discuss their limitations.
We sketch a new privacy-preserving system which guarantees message
authentication through both a priori and a posteriori countermeasures.
1</p>
        <p>Introduction
VANETs allow vehicles to broadcast messages to other vehicles in the
vicinity. It is suggested that each vehicle periodically send messages over
a single hop every 300ms within a distance of 10s travel time (which is a
distance range between 10 m and 300 m)[RH05]. This mechanism can be
used to improve safety and optimize traffic. However, malicious vehicles
can also make use of this mechanism by sending fraudulent messages for
their own profit or just to jeopardize the traffic system. Hence, the system
must be designed to ensure that the transmission comes from a trusted
source and has not been tampered with since transmission.</p>
        <p>Another critical concern in VANETs is driving privacy or vehicle
anonymity. As noted in [Dot06], a lot can be inferred on the driver’s
privacy if the whereabouts and the driving pattern of a car can be tracked.
However, it is possible for attackers to trace vehicles by using cameras or
physical tracking. But such physical attacks can only trace specific
targets and are much more expensive than monitoring the communication
in VANETs. This paper addresses the latter attacks.
2</p>
        <p>Countermeasures for securing VANETs
VANETs function to improve safety only if the messages sent by
vehicles are trustworthy. Dealing with fraudulent messages is a thorny issue
for safety engineers due to the self-organized property of VANETs. The
situation is deteriorated by the privacy requirements of vehicles since,
in a privacy-preserving setting, the message generators, i.e. the vehicles,
are anonymous in the sense that their identities are unknown. A
number of schemes have been proposed to reduce fraudulent messages; such
proposals fall into two classes, namely a posteriori and a priori.
2.1</p>
        <p>A posteriori countermeasures
A posteriori countermeasures consist of taking punitive action against
vehicles who have been proven to have originated fraudulent messages.
To be compatible with privacy preservation, these countermeasures
require the presence of a trusted third party able to open the identities
of dishonest vehicles. Then the revoked vehicles can be expelled from
the system. Cryptographic authentication technologies have been
extensively exploited to offer a posteriori countermeasures. Some proposals use
regular digital signatures [RPH06,RH07,RPAJ07,AFWZ07]. In these
proposals, vehicle privacy is provided by a pseudonym mechanism, in which
certificate authorities (CAs) produce many pseudonyms for each
vehicle so that attackers cannot trace the vehicles producing signatures in
different periods with different pseudonyms, except if the CAs open the
identities of the vehicles. The pseudonym mechanism is not that efficient
due to the heavy overhead of pseudonym generation and storage. Other
schemes use sophisticated cryptographic technologies such as group
signatures [GBW07] or ring signatures [LSHS07,GGT06]. The latter methods
are more efficient, but those using ring signatures cannot trace malicious
vehicles due to the unconditional anonymity of ring signatures. Along this
research line, the scheme in [GBW07] seems the most efficient one that
can provide revokable anonymity.
2.2</p>
        <p>A priori countermeasures
A priori countermeasures attempt to prevent the generation of
fraudulent messages. This approach is based on the assumption that most
users are honest and will not endorse any message containing false data.
Another implicit assumption is the usual common sense that, the more
people endorse a message, the more trustworthy it is. Along this research
line, the schemes in [GGS04,ODS07,PP05,RAH06,DDSV08] exploit the
assumption that there is a majority of honest vehicles in VANETs. Hence,
these schemes introduce some form of threshold mechanism: a message is
trusted if it has been verifiably endorsed by a number of vehicles above a
certain threshold. Among these schemes, the proposals in [DDSV08] may
be the most efficient while enabling anonymity of message originators.
But their scheme does not provide anonymity revocability, which may
not suit some applications in which anonymity must be revoked “for the
prevention, investigation, detection and prosecution of serious criminal
offences”[EP05].
3</p>
        <p>Discussion
Unfortunately, neither a posteriori nor a priori countermeasures are solely
sufficient to secure VANETs. By taking strict punitive action, a
posteriori countermeasures can exclude some rational attackers producing
bogus messages to obtain benefits or pranks. However, they are ineffective
against irrational attackers such as terrorists. Even for rational
attackers, damage has already occurred when punitive action is taken. It seems
that a priori countermeasures function better in this case because they
prevent damage beforehand by letting the vehicles trust only messages
endorsed by a number of vehicles. Although the underlying assumption
that there is a majority of honest vehicles in VANETs generally holds, it
cannot be excluded that a number of malicious vehicles greater than or
equal to the threshold are present in specific locations, for instance. For
example, this is very plausible if some criminal organization undertakes
to divert traffic from a certain area by broadcasting messages informing
that a road is barred. Furthermore, for convenience in implementation,
existing schemes use an even stronger assumption that the number of
honest vehicles in all cases should be at least a preset threshold. But such
a universally valid threshold does not exist in practice. Indeed, the
threshold should somehow take the traffic density and the message scope into
account: a low density of vehicles calls for a lower threshold, whereas a
high density and a message relevant to the whole traffic of a city requires
a sufficiently high threshold.</p>
        <p>The situation is aggravated by the anonymity technologies used some
proposals. A system preserves anonymity when it does not require the
identity of its users to be disclosed. Without anonymity, attackers can
trace all the vehicles by monitoring the communication in VANETs, which
in turn can enable the attackers to mount serious attacks against specific
targets. Hence, anonymity is a critical concern in VANETs. However,
anonymity can also weaken a posteriori and a priori countermeasures.
Indeed, attackers can send fraudulent messages without fear of being
caught due to anonymity, and as a result, no punitive action can be taken
against them. Furthermore, some proposals provide strong anonymity,
i.e. unlinkability. Unlinkability implies that a verifier cannot distinguish
whether two signatures come from the same vehicle or two vehicles. This
feature may enable malicious vehicles to mount the so-called Sybil attack:
a vehicle generates a fraudulent message and then endorses the message
herself by computing on it as many signatures as required by the
threshold in use; since signatures are unlinkable, no one can find out that all
of them come from the same vehicle. Hence, elegantly designed protocols
are required to secure VANETs when incorporating anonymity.
4</p>
        <p>Towards a combination of a priori and a posteriori
countermeasures
Bearing in mind that enhancing safety and traffic efficiency is one of
the main thrusts behind VANETs, we propose a new efficient system
to balance public safety and vehicle privacy. Both a priori and a
posteriori countermeasures are resorted to in order to thwart attackers. To
the best of our knowledge, ours is the first system equipped with both
types of countermeasures. We achieve this goal by drawing on the novel
technology of message-linkable group signatures (MLGS). In an MLGS
scheme, a vehicle stays anonymous if it produces two signatures on two
different messages. However, if it produces two signatures on the same
message, then it will be identified, which effectively thwarts the Sybil
attack in a privacy-preserving system. This novel technology also enables us
to realize a threshold-adaptive authentication in which the threshold can
adaptively change in light of the context of messages, instead of having to
be preset during the system design stage. Furthermore, a fast batch
verification method is presented to speed up the validation of authenticated
messages. Since vehicles periodically receive a large number of messages
to be validated, such a batch verification is critical to make
authentication implementable in VANETs. Details on the new scheme will be given
in [WD08].</p>
        <p>Acknowledgments and disclaimer
This work was partly supported by the Spanish Government through
projects CONSOLIDER INGENIO 2010 CSD2007-00004 “ARES” and</p>
        <p>TSI2007-65406-C03-01 “E-AEGIS”, and by the Government of Catalonia
under grant 2005 SGR 00446. The authors are with the UNESCO Chair
in Data Privacy, but their views do not necessarily reflect the position of
UNESCO nor commit that organization.
processed in connection with the provision of public electronic communication
services and amending Directive 2002/58/EC (COM(2005)0438 C6-0293/2005
2005/0182(COD)), 2005
[WD08] Q. Wu and J. Domingo-Ferrer. Improved trustworthiness of vehicular
communications with a priori and a posteriori countermeasures. Manuscript in preparation,
2008.
Location Privacy in Location-Based Services:</p>
        <p>Beyond TTP-based Schemes
Agusti Solanas, Josep Domingo-Ferrer, and Antoni Marıtn´e z-Balleset´</p>
        <p>Rovira i Virgili University
Department of Computer Engineering and Maths</p>
        <p>UNESCO Chair in Data Privacy</p>
        <p>Av. Pıas¨os Catalans 26</p>
        <p>E-43007 Tarragona, Catalonia, Spain
{ agusti.solanas,josep.domingo,antoni.martinez} @urv.cat
Abstract. Location-Based Services (LBS) are gaining importance due
to the advances in mobile networks and positioning technologies.
Nevertheless, the wide deployment of LBS can jeopardise the privacy of their
users, so ensuring user privacy is paramount to the success of those
services. This article surveys the most relevant techniques for guaranteeing
location privacy to LBS users. The rigid dichotomy between schemes
which rely on Trusted Third Parties (TTP-based) and those wh ich do
not (TTP-free) is emphasised. Also, the convenience of both approaches
is discussed and some ideas on the future of location privacy in these
services are sketched.</p>
        <p>Keywords: Anonymisation/pseudonymisation in LBS, Trust
management in LBS.
1</p>
        <p>
          Introduction
The Information Society rests on the Information and Communications
Technologies (ICT). Location-Based Services (LBS) are becomin g an important ICT
and will be eventually available anywhere anytime. LBS provide users with highly
personalised information accessible by means of a variety of mobile devices that
are able to locate themselves, e.g. by using a GPS or a fixed network
infrastructure with GSM [1]. Mobile devices are ubiquitous and services related to the
users’ current location proliferate. Examples of LBS are lo cation-based tourist
information [
          <xref ref-type="bibr" rid="ref44">2</xref>
          ], route guidance [
          <xref ref-type="bibr" rid="ref45">3</xref>
          ], emergency assistance [
          <xref ref-type="bibr" rid="ref16 ref46">4</xref>
          ], location-based
advertising [
          <xref ref-type="bibr" rid="ref17 ref47">5</xref>
          ], etc.
        </p>
        <p>
          The extensive deployment of ubiquitous technology is not without privacy
drawbacks. By sending their locations, LBS users could endanger their security
and privacy because, for example, an attacker could determine their location and
track them. This tracking capability of attackers opens up many computer-aided
crime possibilities (harassment, car theft, kidnapping, etc.). Also, if an attacker
impersonates an LBS provider, the traffic patterns of LBS users could be
influenced by false information, and the users’ location could be compromised [
          <xref ref-type="bibr" rid="ref18 ref48">6</xref>
          ].
There are also other attacks which aim to identify users by means of the
locations contained in their queries. By identifying users, attackers can link queries
to real identities. In those ways, attackers can obtain detailed profiles of the users
and send them undesired advertisements or even harass them. Some examples
of techniques/attacks for identifying users are the restricted space identification
(RSI) attack and the observation identification (OI) attack. The RSI attack
consists in linking locations to identities by using queries which are submitted from
a restricted space (e.g. if a user submits queries from his garage in a suburban
house, it is easy to link those queries to his real identity by looking up who lives
in that house, for example by means of a phonebook). Similarly the OI attack
links queries to identities by observing where users are (i.e. the attacker knows
the users’ location because she can see him) and correlating this information
with the location contained in their queries [
          <xref ref-type="bibr" rid="ref19 ref49">7</xref>
          ].
        </p>
        <p>
          Several countries have taken legal initiative to cope with privacy problems
related to electronic communications. In Europe, the European directive on Data
Protection and Privacy [
          <xref ref-type="bibr" rid="ref20 ref50">8</xref>
          ] agrees on a set of measures to assure the privacy of
the users of telecommunications technologies such as LBS. Similarly, the
Wireless Privacy Protection Act [
          <xref ref-type="bibr" rid="ref21 ref51">9</xref>
          ] does the same in the US. Unfortunately, all these
measures regulate well-established business models but th ey can hardly be
applied to the new LBS that arise in ad-hoc networks created and dismantled on
the fly.
        </p>
        <p>
          Although there are many other relevant topics related to LBS (e.g profile
anonymisation [
          <xref ref-type="bibr" rid="ref22 ref23 ref52 ref53">10, 11</xref>
          ], trajectories analysis [
          <xref ref-type="bibr" rid="ref24 ref25 ref54 ref55">12, 13</xref>
          ], privacy in location-based
community services [
          <xref ref-type="bibr" rid="ref26 ref56">14</xref>
          ], etc.), in this article we concentrate on the methods to
protect the location privacy of LBS users who send their location to an LBS
provider.
1.1
        </p>
        <p>Contribution and plan of this article
In this article, we provide a survey of the most relevant and recent schemes
designed to offer location privacy to LBS users. We analyse, organise and classify
them in two main groups: (i) TTP-based schemes and (ii) TTP-f ree schemes.
Moreover, we sketch some ideas on the future of location privacy in LBS and
some lines for future research.</p>
        <p>The rest of the article is organised as follows. In Section 2 we suggest a
classification of the methods for location privacy in LBS proposed in the literature.
Section 3 is devoted to the analysis of TTP-based schemes and Section 4 studies
TTP-free approaches. Finally, Section 5 contains a brief di scussion and some
suggestions for future research.
2</p>
        <p>Classification of methods for location privacy in LBS
In the simplest form of communication between an LBS user (U ) and an LBS
provider (P ), the former sends a simple query (Q) containing an ID, his location
(L) and a request for information (I) that he wants to retrieve from P . Thus, a
simple query sent from U to P can be Q = { IDU , L, I} = { IDU , xU , yU , “Where
is the closest bus station?” } (cf. Figure 1.A). By sending their current locations
to P , LBS users assume that P manages their data honestly and refrains from
any misuse. However, LBS providers cannot always be trusted and more complex
communication schemes are needed.</p>
        <p>Most of the solutions proposed in the literature to address the location
privacy problem are based on Trusted Third Parties (TTP), i.e. entities which fully
guarantee the privacy of their users. Although this approach is widely accepted,
it simply moves users’ trust from LBS providers to intermedi ate entities. By
doing so, LBS providers are no longer aware of the real locations and identities
of the users; trust and, by extension, power are handed over to intermediate
entities such as brokers, pseudonymisers or anonymisers. The problem is that
users are not necessarily satisfied by completely trusting intermediate entities or
providers, especially after the recent scandals related to the disclosure of personal
data by this kind of trusted entities1 (cf. Figure 1.B).</p>
        <p>The main difference between the simple communication scheme and the
TTPbased one is that in the latter the set of intermediate entities can be expected
to be smaller than the number of service providers. Therefore, intermediate
entities can be well-known and the risk of trusting a dishonest entity is lessened.
However, due to the above mentioned scandals, many users would prefer to trust
1 In Autumn 2007, several data privacy disasters happened in the UK connected to
Her Majestys’ Revenue and Customs. Two computer disks full o f personal data on
25 million British individuals disappeared; HMRC also lost another disk containing
pension records of 15,000 people and a laptop containing personal data on 400 people.
In 2006 in the U.S, data on 26.5 million people were stolen from the home of an
employee of the Department of Veterans Affairs, and queries by 658,000 users were
disclosed by the AOL search engine.</p>
        <p>LBS Privacy Methods
TTP-based</p>
        <p>TTP-free
Simple</p>
        <p>Policy-based</p>
        <p>PIR-based
Pseudonym-based</p>
        <p>Anonymity-based</p>
        <p>Collaboration-based Obfuscation-based
nobody, which leads to TTP-free schemes. These represent a s ubstantial change
of paradigm (cf. Figure 1.C). Instead of trusting a third party, users collaborate
to protect their privacy. As it is explained in Section 4, there is not even need to
trust the users one collaborates with. Figure 2 depicts our proposed classification
of location privacy methods. The main aim of the classification is to emphasise
the rigid dichotomy between these two paradigms: (i) TTP-ba sed methods and
(ii) TTP-free methods. In the following sections we review s ome of the most
relevant representatives of TTP-based and TTP-free method s.
3</p>
        <p>Privacy in TTPb-ased schemes
TTP-based schemes are very common because they are easy to un derstand/develop,
and because, in general, they offer a reasonable trade-off bet ween efficiency,
accuracy and privacy. Moreover, some of the ideas used in these schemes arose in
more mature fields like e-commerce.</p>
        <p>In the simple scheme described in Section 2, users send their location
information and queries directly to the LBS provider. In this scheme, whatever
location privacy LBS users can get depends on the honest behaviour of the LBS
provider.</p>
        <p>In the following sections we concentrate on some TTP-based s chemes that
aim to protect the location privacy of the users.
3.1</p>
        <p>Policy-based schemes
Policy-based schemes are one step forward in LBS privacy wit h respect to the
simple scheme. Although the conceptual framework is the same (i.e. a user
submits queries to a provider), in this case, providers adhere to a set of privacy
policies known by users. Hence, if providers do not properly follow their privacy
policies, users have the right to ask for a compensation and/or take legal action
against providers.</p>
        <p>
          Privacy policies are legal notices that contain statements defining what
service providers can do with their users’ personal data. Priva cy policies are
published by service providers, and users decide whether such policies are acceptable
to them. These policies refer to many concepts and specific languages are used
to define them [
          <xref ref-type="bibr" rid="ref27 ref28 ref57 ref58">15, 16</xref>
          ]. Users reach an agreement with providers about which
data are collected, what are these data used for and how they can be distributed
to third parties. In this kind of schemes, privacy is understood as the ability of
individuals to decide when, what, and how information about them is disclosed
to others. Ideally, users can choose amongst a variety of policies. So, depending
on the selected policy, users can save some money but, in return, providers can
distribute/sell some of their data.
        </p>
        <p>
          These schemes are widely used on the Internet by e.g. e-comme rce sites which
define their privacy policies in e.g. P3P (Platform for Privacy Preferences) [
          <xref ref-type="bibr" rid="ref29 ref59">17</xref>
          ].
They have been used for automotive telematics [
          <xref ref-type="bibr" rid="ref30 ref60">18</xref>
          ], and the Geopriv
(Geographic Location/Privacy) Charter of the IETF proposes their use for LBS
also [
          <xref ref-type="bibr" rid="ref31 ref61">19</xref>
          ]. A recent study on the use of policies and access control techniques
can be found in [
          <xref ref-type="bibr" rid="ref32 ref62">20</xref>
          ].
3.2
        </p>
        <p>Pseudonymisers
Pseudonymisers are the simplest intermediate entity between LBS users and
providers. Pseudonymisers receive queries from users and, prior to forwarding
them to LBS providers, they replace the real IDs of the users by fake ones (i.e.
pseudonyms). In this way, the real user IDs remain hidden to the provider, but
pseudonymisers must store the real IDs and their corresponding pseudonyms
in order to forward the answers from the providers to the users. Clearly, users
must completely trust pseudonymisers, because the latter see all the location
information on the former.</p>
        <p>
          The main problem of this technique is that an attacker (e.g. the LBS provider
herself) can infer the real identity of the user by linking the user location with
e.g. a public telephone directory (e.g. by using the aforementioned RSI or OI
attacks [
          <xref ref-type="bibr" rid="ref19 ref49">7</xref>
          ]).
3.3
        </p>
        <p>Anonymisers
Anonymisers are the most sophisticated option in TTP-based location privacy.
Instead of taking care of policies or users’ identifiers, ano nymisers assume that
communications are anonymous, i.e. LBS providers do not require an ID to
answer queries2. Anonymisers aim to hide users true identity with respect to
emitted location information. In this section we concentrate on techniques that
hide the location information of users and we assume that identifier abstraction
is already guaranteed.
2 If this assumption was not made, it would be easy to track a given LBS user by
simply checking the ID or the pseudonym (like in the case of pseudonymisers).</p>
        <p>
          A very common way to hide the real location of the users from the LBS
provider is by using the k-anonymity property. k-Anonymity is an interesting
approach to face the conflict between information loss and disclosure risk, suggested
by Samarati and Sweeney [
          <xref ref-type="bibr" rid="ref33 ref34 ref35 ref36 ref63 ref64 ref65 ref66">21–24</xref>
          ]. Although it was designed fo r application in
databases by the Statistical Disclosure Control (SDC) community, k-anonymity
has been adapted to LBS privacy. In this context, we say that the location of
a user is k-anonymous if it is indistinguishable from the location of a nother
k − 1 users. So, the fundamental idea behind k-anonymisers is to replace the
real location of the user by cloaking areas in which at least k users are located.
Anonymisers transform locations (x, y) at time t to ([x1, x2], [y1, y2], [t1, t2])
where ([x1, x2], [y1, y2]) is the rectangular area containing (x, y) between times
t1 and t2 such that t ∈ [t1, t2]. By doing so, LBS providers cannot easily
determine which of the k users in the cloaking area is really submitting the query.
        </p>
        <p>
          Many examples of this kind of approach and other similar ones based on
cloaking can be found in the literature [
          <xref ref-type="bibr" rid="ref19 ref37 ref38 ref49 ref67 ref68">7, 25, 26</xref>
          ]. One of the most recent advances
in anonymisers is proposed in [
          <xref ref-type="bibr" rid="ref39 ref69">27</xref>
          ], where an extension of a previous anonymiser
version [
          <xref ref-type="bibr" rid="ref37 ref67">25</xref>
          ] is proposed. The proposed anonymiser allows a user to define his
personal privacy requirements, i.e. the number k of users amongst which he
wants to be anonymised, and the maximum delay and location perturbation he
is willing to accept. The proposal is resilient against identification attacks such
as RSI and OI. However, it has some important drawbacks which, as we explain
in the next section, can be avoided by TTP-free approaches: ( i) the architecture
relies on a TTP, so that the user must completely trust the platform mediating
between him and the LBS provider; (ii) it is assumed that LBS providers are
not malicious but semi-honest, which might turn out to be too much of an
idealisation; and (iii) the architecture is centralised, which makes it vulnerable
to Denial of Service (DoS) attacks.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref40 ref70">28</xref>
          ] a similar method called PrivacyGrid is described. Although the anonymiser
described in [
          <xref ref-type="bibr" rid="ref39 ref69">27</xref>
          ] and the PrivacyGrid approach are very similar, the latter seems
to be more efficient due to the cloaking techniques based on grids (i.e. bottom-up,
top-down and hybrid) that it uses. Moreover PrivacyGrid add s the l-diversity
property to the already considered k-anonymity one. By doing so, the privacy
of LBS users is improved. Although PrivacyGrid seems to improve the proposal
in [
          <xref ref-type="bibr" rid="ref39 ref69">27</xref>
          ], it mainly suffers from the same shortcomings.
        </p>
        <p>Current research on anonymisers focuses on improving the efficiency of the
intermediaries and designing highly personalised services able to guarantee the
privacy of the users.
4</p>
        <p>Privacy in TTPf-ree schemes
Due to the shortcomings of the TTP-based schemes, other meth ods that do not
rely on TTPs have been proposed. First, we consider the collaboration methods
that aim to obtain the same results (e.g. k-anonymity, l-diversity, efficiency)
than the ones based on TTP. Then, we pay attention to the methods based on
the obfuscation of the real location without collaboration. Finally we point out
a new location privacy trend based on Private Information Retrieval (PIR).
4.1</p>
        <p>
          Collaboration-based methods
In [
          <xref ref-type="bibr" rid="ref41 ref71">29</xref>
          ], the first collaborative TTP-free algorithm for loca tion privacy in LBS is
proposed. The user perturbs his location by adding zero-mea n Gaussian noise to
it. Then the user broadcasts his perturbed location and requests neighbours to
return perturbed versions of their locations. Amongst the replies received, the
user selects k −1 neighbours such that the group formed by the locations of these
neighbours and his own perturbed location spans an area A satisfying Amin &lt;
A &lt; Amax, where Amin is a privacy parameter (the minimum required area for
cloaking) and Amax is an accuracy parameter (the maximum area acceptable
for cloaking). Finally, the user sends to the LBS the centroid of the group of
k perturbed locations including his own. Since users only exchange perturbed
locations, they do not need to trust each other for privacy. On the other hand,
perturbations tend to cancel out each other in the centroid, so accuracy does
not degrade3. This method does not achieve k-anonymity because the centroid
is only used by a single user to identify himself. In addition, due to the noise
cancellation, users cannot use this method several times without changing their
location. In [
          <xref ref-type="bibr" rid="ref42 ref72">30</xref>
          ], a similar peer-to-peer scheme for locati on privacy is presented.
Its main idea is to generate cloaking areas as in [
          <xref ref-type="bibr" rid="ref41 ref71">29</xref>
          ]: users must find other users
in their cover range and share their location information. Once this information
is known, users can send their queries to LBS providers using the cloaking area
instead of their real locations. The main shortcoming of this proposal is that
users must trust other users because they exchange their real locations. Thus, a
malicious user can easily obtain and publish the location of other users. Although
we classify this technique as a TTP-free technique, it can al so be understood as
a distributed TTP-based scheme, where each user is a TTP.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref43 ref73">31</xref>
          ], the authors propose a method based on Gaussian noise addition to
compute a fake location that is shared by k users (unlike in [
          <xref ref-type="bibr" rid="ref41 ref71">29</xref>
          ]). Thus, all k
users use the same fake location and the LBS provider is unable to distinguish
one user from the rest, so that their location becomes k-anonymous. This method
was extended to support non-centralised communications in [
          <xref ref-type="bibr" rid="ref74">32</xref>
          ]. The proposal
is based on a stack of modules that progressively increase the privacy achieved
by users. The basic module is equivalent to the method described in [
          <xref ref-type="bibr" rid="ref42 ref72">30</xref>
          ] where
users have to trust each other because they share their location. Once they know
the locations of other users, they can compute a centroid that they use as their
fake location. In order to allow users to exchange their location without trusting
other peers, a second module that perturbs the location is added. This module
adds Gaussian noise with zero mean to the real location of users. As explained
above, the centroid of locations perturbed with zero-mean G aussian noise is quite
similar to the centroid of unperturbed locations. However, if this procedure is
3 The average of k zero-mean perturbations with variance σ2 has zero mean and
variance σ2/k.
repeated several times with static users (i.e. users that do not change their
location substantially), their real location could be deduced because of the noise
cancellation (this is the main problem of [
          <xref ref-type="bibr" rid="ref41 ref71">29</xref>
          ]). To prevent this, the protocol uses
privacy homomorphisms [
          <xref ref-type="bibr" rid="ref75">33</xref>
          ] to guarantee that users cannot see the real locations
of other users whilst still being able to compute the centroid. Finally, a module
that distributes users in a chain is added to avoid denial of service attacks to the
central user. At the end of the protocol users become k-anonymous and their
location privacy is secured. However, the main problem of this proposal is that
it cannot provide a lower bound of the location error.
4.2
        </p>
        <p>
          Obfuscation-based methods
Obfuscation is a TTP-free alternative to collaboration-ba sed methods.
Obfuscation can be understood as the process of degrading the quality of information
about a users’ location, with the aim to protect that users’ p rivacy [
          <xref ref-type="bibr" rid="ref76">34</xref>
          ]. Some
methods like the ones described in previous sections (e.g. cloaking methods) can
be understood as special kinds of obfuscation because they basically modify the
location information in several ways to improve users’ priv acy. However, we
classify them in different categories because they need TTPs and/or achieve other
properties such as k-anonymity or l-diversity.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref77">35</xref>
          ] an obfuscation method based on imprecision is presented. The space
is modelled as a graph where vertices are locations and edges indicate adjacency.
Hence, in order to obtain an imprecise location, the user sends a set of vertices
instead of the single vertex in which he is located. The LBS provider cannot
distinguish which of the vertices is the real one. The article proposes negotiation
algorithms that allow users to increase the QoS whilst maintaining their privacy.
The main problem of this technique is that users and providers must share the
graph modelling the space (cf. [
          <xref ref-type="bibr" rid="ref78">36</xref>
          ] for a comprehensive approach to imprecision
in location systems). Some other recently proposed obfuscation methods can be
found in [37], where the real location of LBS users is replaced by circular areas
of variable centre and radius.
        </p>
        <p>SpaceTwist [38] is the most recent proposal for non-collabo rative TTP-free
location privacy. SpaceTwist generates an anchor (i.e. a fake point) that is used
to retrieve information on the k nearest points of interest from the LBS provider.
After successive queries to the LBS provider, SpaceTwist is able to determine
the closest interest point to the real location whilst the LBS provider cannot
derive the real location of the user. The main advantages of this method are: (i)
no TTP and no collaboration are needed; (ii) the closest interest point is always
found; (iii) the location of the user is hidden in a controlled area. However, due
to the lack of collaboration, this method is not able to achieve the k-anonymity
and/or the l-diversity properties.
4.3</p>
        <p>PIR-based methods
A totally different approach to TTP-free LBS privacy is propo sed in [39]. In
that article, Private Information Retrieval (PIR) is used to provide LBS users
with location privacy. Although the idea of using PIR techniques is promising,
the proposed approach requires the LBS provider to co-opera te with users by
following the PIR protocol; this prevents the use of this method in real
environments, where LBS providers simply answer queries containing a location or
an area without any regard for location privacy. However, if this shortcoming
was solved and without significant computation and efficiency penalties, using
collaborative PIR amongst peers (i.e. users) could be a really promising future
research line.
5</p>
        <p>Discussion and future work
In the above sections we have reviewed some of the most recent and relevant
contributions to location privacy protection in LBS. There is a clear
distinction between TTP-based schemes and the TTP-free ones. Altho ugh TTP-based
schemes are the most common ones, TTP-free schemes seem supe rior in terms
of privacy due to the following shortcomings of intermediate TTPs: (i) TTPs
are critical points which can be attacked; (ii) TTPs are bottlenecks; (iii) There
must be many users subscribed to a TTP for the latter to be able to compute
suitable cloaking regions (offering sufficient privacy and accuracy).</p>
        <p>In general TTP-based schemes are weak because users rely on a single trusted
entity. This entity can be impersonated by a bogus TTP created by the attacker,
in which case all the information shared by users with the bogus TTP falls in
the hands of the attacker. A way to mount such an attack is to tamper with
transmitters or use a more powerful signal.</p>
        <p>Despite being inferior regarding privacy, TTP-based schem es are easier to
implement than collaborative-based methods because all th e infrastructure
required by users to circumvent the use of a TTP is not necessary. However,
obfuscation-based methods are also easy to implement. We be lieve that there is
room in the market for both approaches.</p>
        <p>The use of k-anonymity and l-diversity properties must be carefully
considered because in some scenarios they are insufficient to preserve users’ privacy [40].
In our opinion, there are a lot of opportunities for synergy between future work
in PIR and TTP-free LBS privacy. Indeed, current PIR techniq ues face the (very
serious) limitation of needing co-operation from the datab ase server in following
the PIR protocol. If practical PIR protocols are developed which do not need
such a co-operation, it will be possible to use them for TTP-f ree location privacy:
if a query can be submitted to a non-co-operative commercial LBS server in such
a way that the latter does not learn what the query is about (i.e. the location
supplied by the user), then one obtains a TTP-free LBS privac y protocol.
Acknowledgements
The authors are solely responsible for the views expressed in this article, which
do not necessarily reflect the position of UNESCO nor commit that organisation.
This work was partly supported by the Spanish Ministry of Education through</p>
        <p>In First International Conference on Security in Pervasive Computing, Boppard,
Germany, March 12–14, 2003, Revised Papers , volume 2802 of LNCS, pages 50–59.
Springer Verlag, 2003.
The CURUPIRA-2</p>
        <p>Block Cipher for Constrained</p>
        <p>Platforms: Specication and Benchmarking
Marcos Simpclio Jr 1, Paulo S. L. M. Barreto 1 ?, Tereza C. M. B. Carvalho 1,</p>
        <p>Cintia B Margi1, and Mats Naslund 2
1Laboratory of Computer Architecture and Networks, PCS-EP, University of Sa~o</p>
        <p>Paulo, Brazil
{mjunior,pbarreto,carvalho,cbmargi}@larc.usp.br
2Ericsson Research - Stockholm, Sweden</p>
        <p>mats.naslund@ericsson.com
Abstract. Privacy is a key concern in Location Based Applications
(LBAs), especially due to their intensive use resource constrained devices
in which general purpose ciphers are dicult to deploy. In this paper, we
address this issue by specifying a new, faster key-schedule algorithm for
the Curupira block cipher. This special-purpose cipher follows the Wide
Trail Strategy (such as AES) and is tailored for resource-constrained
platforms, such as sensors and mobile devices. Furthermore, we present our
benchmark results for both the Curupira-1 (which adopts the original
key-schedule specication) and the Curupira-2 (which adopts the new
one) in appropriate testbeds.</p>
        <p>Keywords: location based services, symmetric cryptography, involutional
block ciphers, sensor networks, constrained platforms, ciphers
benchmark.
1
The continuous and widespread development of context-aware applications based
on Wireless Sensor Networks (WSNs) shows their potential to allow a high
level of integration between computers and the physical environment.
LocationBased Applications (LBAs) play an important role in this scenario,
automatically adapting their behaviors to the available geo-spatial location information
and the nearby sensors and devices. This way, these systems are able to provide
both novel and more eective services. However, due to the sensitive nature of
the data involved (both location information and other data collected by the
network nodes) the security of the communication in these applications is an
important concern.</p>
        <p>
          Battery-powered sensor nodes and other limited platforms normally
employed in LBAs impose several constraints over the cryptographic algorithms
? Supported by the Brazilian National Council for Scientic and Technological
Development (CNPq) under grant 312005/2006-7. yThis work was supported by the
Research and Development Centre, Ericsson. Telecomunicaco~es S.A., Brazil
that can be eectively deployed. For example, commercial motes usually have a
memory size of 8-12 KB for code and 512-4096 bytes of RAM, as well as 4-16 MHz
processors [
          <xref ref-type="bibr" rid="ref29 ref33 ref59 ref63">21, 17</xref>
          ]. Moreover, messages exchanged in these applications are
frequently small, a typical packet being 24 bytes in length [
          <xref ref-type="bibr" rid="ref34 ref42 ref64 ref72">22, 30</xref>
          ]. In this context,
complex all-purpose algorithms not only take longer to run but also consume
more energy, which motivates the research for more ecient alternatives.
        </p>
        <p>
          To date, many architectures have been proposed to provide security in WSNs.
One of the most popular is TinySec [
          <xref ref-type="bibr" rid="ref31 ref61">19</xref>
          ], which oers link layer security to
TinyOS [
          <xref ref-type="bibr" rid="ref30 ref60">18</xref>
          ], the de facto standard operating system for sensor networks. As
default block cipher, TinySec has chosen Skipjack [
          <xref ref-type="bibr" rid="ref75">33</xref>
          ] due to its superior
performance. Meanwhile, RC5 [
          <xref ref-type="bibr" rid="ref76">34</xref>
          ] was not considered as an alternative since it is
considered to be encumbered with patents and, even if it can run faster than
Skipjack when the round keys are pre-computed, this incurs extra RAM
requirements [
          <xref ref-type="bibr" rid="ref27 ref57">15</xref>
          ]. However, as Skipjack uses relatively small (80-bit) keys and 31 out of
its 32 rounds can be successfully cryptanalyzed [
          <xref ref-type="bibr" rid="ref21 ref51">9</xref>
          ], it presents a very low margin
of security. These observations lead to security concerns regarding TinySec, as
well as other architectures based on the same cipher, such as TinyKeyMan [
          <xref ref-type="bibr" rid="ref36 ref66">24</xref>
          ],
MiniSec [
          <xref ref-type="bibr" rid="ref37 ref67">25</xref>
          ] and Sensec [
          <xref ref-type="bibr" rid="ref35 ref65">23</xref>
          ].
        </p>
        <p>
          The literature includes numerous analyses of modern cryptographic
algorithms, aiming to identify those well-suited to WSNs both in terms of security
and performance. One of the most extensive is presented by [
          <xref ref-type="bibr" rid="ref33 ref63">21</xref>
          ], which
concludes that Skipjack is the most energy-ecient of all surveyed ciphers, while
the Advanced Encryption Standard (AES) [
          <xref ref-type="bibr" rid="ref74">32</xref>
          ] and MISTY1 [
          <xref ref-type="bibr" rid="ref39 ref69">27</xref>
          ] are considered
reasonable alternatives in scenarios with higher security requirements. However,
MISTY1 is considered to be encumbered with patents, while AES has larger
code, memory, and energy requirements, as well as a block size which is too
big for sensor networks. It could also be possible to rely on cryptographic
hardware [
          <xref ref-type="bibr" rid="ref28 ref58">16</xref>
          ], but this is not a solution available in many modern devices.
        </p>
        <p>
          An alternative to address these issues is the adoption of Curupira [
          <xref ref-type="bibr" rid="ref18 ref48">6</xref>
          ], a
special-purpose block cipher specially developed with constrained platforms in
mind. The cipher follows the Wide Trail strategy [
          <xref ref-type="bibr" rid="ref23 ref53">11</xref>
          ], such as the AES itself,
which assures a good security against cryptanalysis. Also, it presents an
involutional structure (meaning that the encryption and decryption processes are
identical except by the key-schedule) and is very exible in terms of
implementation. This way, the cipher is well adapted to resource constrained scenarios
such as those faced by LBAs.
        </p>
        <p>In this paper, we propose a new, faster key-schedule algorithm for the
Curupira algorithm and analyze its security. We also present a benchmark
comparing Skipjack, AES and Curupira in relevant platforms. In order to discern
between the two versions of the Curupira cipher, we write ‘ Curupira-1" for
the one adopting the original key-schedule and \ Curupira-2" for the new
specication. We write simply \ Curupira" when the discussion applies to both.</p>
        <p>This document is organized as follows. We introduce basic mathematical tools
and notation in section 2. An overview of the Curupira-1, including its
keyschedule algorithm, is given in section 3. The second version of the key-schedule
is presented in section 4, which also discuss security, performance and
implementation issues for the resultant Curupira-2 block cipher. Our benchmark results
are presented in section 5. We conclude in section 6.
2</p>
        <p>Mathematical preliminaries and notation
The nite eld GF(2 n) will be represented as GF(2)[ x]=pn(x), where pn(x) is a
primitive pentanomial of degree n over GF(2), i.e. deg( pn(x)) n. This way, all
multiplications over GF(2 8) are made modulo p8(x) = x8 + x6 + x3 + x2 + 1.
This choice of p8(x) incurs in a simple form for the primitive cube root of unity,
c(x) = x85 mod p8(x) = x4 + x3 + x2.</p>
        <p>An element u = u7x7 +: : :+uixi +: : :+u0 of GF(28) where ui 2 GF(2) for all
i = 0; : : : ; 7, will be denoted by the numerical value u7 27 + : : : + ui 2i + : : : + u0,
written in hexadecimal notation. Thus, the polynomial c(x) is written 1C, while
p8(x) is written 14D. The multiplication by the polynomials x and c(x) are
denoted xtimes and ctimes, respectively.</p>
        <p>
          The set of all 3 n matrices over GF(2 m) is denoted by Mn. Let D and E
denote the MDS matrices (see [
          <xref ref-type="bibr" rid="ref38 ref68">26</xref>
          ] for a denition) as follows:
2
3
2
        </p>
        <p>3
3 2 2 1+c(x) c(x) c(x)
D = 4 4 5 4 5 ; E = 4 c(x) 1+c(x) c(x) 5 :</p>
        <p>6 6 7 c(x) c(x) 1+c(x)
3</p>
        <p>
          Overview of the CURUPIRA-1 structure
This section gives a brief description of the Curupira-1 original specication.
For further details, we refer to [
          <xref ref-type="bibr" rid="ref18 ref48">6</xref>
          ].
        </p>
        <p>
          The Curupira is a block cipher specially tailored for constrained platforms.
It operates on 96-bit data blocks (organized as M4 matrices, mapped by columns
instead of by rows) and accepts 96-, 144- or 192-bit keys, with a variable number
of rounds. The cipher round structure is similar to the one in BKSQ [
          <xref ref-type="bibr" rid="ref24 ref54">12</xref>
          ], with
the advantage of being involutional, resulting in a more compact cipher. Its
round function structure is used for both Curupira-1 and Curupira-2 and is
composed by the following self-inverse transforms (see Figure 1:
{ Nonlinear Layer ( ): all bytes in the block pass through a highly nonlinear
        </p>
        <p>
          S-Box, identical to that used in Anubis [
          <xref ref-type="bibr" rid="ref19 ref49">7</xref>
          ] and Khazad [
          <xref ref-type="bibr" rid="ref20 ref50">8</xref>
          ] block ciphers;
{ Linear Diusion Layer ( ): the block is left-multiplied by the MDS matrix
        </p>
        <p>D (the one dened in section 2), which results in intra-columnar diusion;
{ Permutation Layer ( ): all the bytes in the second and third rows of the
block are permuted according to the rule (a) = b , bi;j = ai;i j ; 0 6 i &lt;
3; 0 6 j &lt; n;
{ Key addition Layer ( ): the round key is XORed with the block.</p>
        <p>Fig. 1. Curupira Round Structure</p>
        <p>These transforms only involve basic operations such as table lookups, XORs
and byte shifts. Thus, they can be implemented in most platforms in a very
ecient way. Nonetheless, when space is available, they can be further accelerated
using pre-computed tables, operating over entire columns of the block instead of
byte-to-byte.</p>
        <p>The CURUPIRA-1 key-schedule
The Curupira-1 key-schedule algorithm is easily invertible and follows a
structure closely related to the one dictated by the Wide Trail Strategy, which assures
a high diusion speed. Also, it has the advantage of being cyclical, which means
that the original key is recovered after a certain number of rounds, avoiding the
need of storing any intermediary sub-key during both encryption and decryption.</p>
        <p>In this rst construction, a 48 t-bit user key K, 2 6 t 6 4 is internally
represented as a matrix K 2 M2t. To generate a sub-key Kn+1 from its predecessor
Kn, the sub-keys pass through three dierent transformations (illustrated in
Figure 2):
{ Constant Addition ( (q)): a set of nonlinear constants, incrementally taken
from the S-Box, are XORed with the bytes in the rst row of the round key;
this way, for a 48t-bit key, the rth round and the column j, the qj(r) constant
is given by: qj(0) = 0 and qj(r) = S[2t(r 1) + j], 0 6 j 6 2t;
{ Cyclic Shift ( ): rotates the second row one position to the left, and rotates
the third row one position to the right, keeping the rst row unchanged;
{ Linear Diusion ( ): the round-key is left-multiplied by the matrix E
(dened in section 2).</p>
        <p>Furthermore, the round keys (r) eectively combined with the data blocks
are chosen by the Key Selection algorithm r, which applies the S-Box to the
rst row of the sub-key Kr and truncates it to 96 bits (i.e., the size of the
block). Thus, even if the Key Selection is not part of the key evolution, it adds
nonlinearity to the key-schedule.
4</p>
        <p>The CURUPIRA-2 key-schedule
The Curupira-1 key-schedule specication is quite conservative, aiming for a
high security level against related-key attacks. Thus, it is reasonable to adopt a
simpler yet secure key-schedule algorithm in order to improve the overall cipher
performance. That is the approach of the Curupira-2 key-schedule, which will
be described in the following sections.
A 48t-bits long user key K (2 6 t 6 4) is internally represented as an element
K belonging to the nite eld GF(2 48t) = GF(2)=p48t(x), where p48t(x) is a
pentanomial in GF(2) chosen in such a way that x8 is a primitive root of p(x).
An element u(x) in this eld can be seen as a byte vector, i.e. u = (U6t 1; : : : ; U0),
where U0 indicates the lesser signicant byte. This way, the cryptographic key
K is directly mapped to K, starting at its most signicant byte, K6t 1.</p>
        <p>
          A pentanomial representation was chosen because primitive pentanomials are
available for all values of t used by the Curupira. In fact, the use of trinomials
would result in a better performance, but unfortunately they do not exist for
elds of type GF(2 n) when n is multiple of 8 [
          <xref ref-type="bibr" rid="ref40 ref70">28</xref>
          ] and, thus, they cannot be used
for any of the cipher key sizes.
        </p>
        <p>For reasons that will become clearer in section 4.3, the pentanomials chosen
for Curupira-2 are:
{ p96(x) = x96 + x16 + x13 + x11 + 1;
{ p144(x) = x144 + x56 + x53 + x51 + 1;
{ p192(x) = x192 + x43 + x41 + x40 + 1:
The schedule constants are denoted q(s), where the index (s) indicates the round
in which they are applied. As in the Curupira-1, the constants are directly
taken from the S-box and, thus, no extra storage is needed. This time, however,
they are interpreted as elements of GF(2 48t) in such a way that q(0) = 0 and, for
s &gt; 0, q(s) = (S[s 1]; 0 : : : ; 0) i.e. a single S-box output is mapped to the most
signicant byte of q(s). As shown in the next section, this is a strategic position
that makes each constant aect exactly 3 bytes of the round key right after its
addition.
The sub-keys are updated during the cipher operation by means of two
operations: a reversible transform, @ : GF(248t) ! GF(248t); and an auto-inverse
transform : GF(248t) ! GF(248t). They are dened in such a way that @(u)
u x8 and, for the polynomials u = (U6t 1; : : : ; U0) and v = (V6t 1; : : : ; V0) in
GF(248t) :</p>
        <p>Vi = U11 i
Vi = Ui</p>
        <p>U12+i if 0 6 i &lt; 6t
otherwise:
12;</p>
        <p>Together with the schedule constants, these transforms compose the key
evolution function r : GF(248t) ! GF(248t), dened as r(u) @ (u q(r)), in
such a way that K(0) K and K(r+1) = r(K(r)).</p>
        <p>The transform is used to ensure a greater diusion to the schedule when
keys greater than 96 bits are adopted, since it combines some of the least
signicant bytes of the key with the most signicant ones. Without this operation,
two 144-bit keys diering only at the byte K11 would generate sub-keys whose
12 least signicant bytes would be identical for the rst 6 rounds; also, for
192bit keys, this result would hold true for the rst 12 sub-keys. As these least
signicant bytes are the ones actually selected in each round, the eect of the
transform is essential to assure a higher diusion speed for 144- and 192-bit
keys.</p>
        <p>Also, the @ transform is particularly interesting due to its performance,
specially on resource-constrained platforms, as stated in the following theorem:
Theorem 1. Let p(x) = xn + xk3 + xk2 + xk1 + 1 be a primitive pentanomial
of degree n = bw over GF(2) such that k3 &gt; k2 &gt; k1, k3 k1 6 w, and
either k3 mod w = 0 or k1 mod w = 0. Then multiplication by xw in GF(2n) =
GF(2)[x]=p(x) can be implemented with no more than 5 XORs and 4 shifts on
w-bit words. Moreover, if 2 2w bytes of storage are available, the cost drops to
no more than 2 XORs on w-bit words and 2 table lookups.</p>
        <p>Proof. For u = Ldn=01 (udxd) 2 GF(2n), let Ui = uwi+w 1xw 1 + : : : + uwi where
i = 0; : : : ; b 1, so that u = Ub 1xw(b 1) + Ub 2xw(b 2) + : : : + U0, which for
brevity we write u = (Ub 1; : : : ; U0). Then one can compute u xw as:
(Ub 1xw(b 1) + Ub 2xw(b 2) + : : : + U0) xw =
Ub 1xn + Ub 2xw(b 1) + : : : + U0xw =
Ub 2xw(b 1) + : : : + U0xw + Ub 1(xk3 + xk2 + xk1 + 1) =
(Ub 2; : : : ; U0; Ub 1) Ub 1(xk3 + xk2 + xk1 ):</p>
        <p>Assume that k3 = w(k + 1) for some k; the case k1 mod w = 0 is handled
analogously. Thus:
u xw = (Ub 2; : : : ; U0; Ub 1)</p>
        <p>Ub 1(xw + xw k3+k2 + xw k3+k1 )xwk</p>
        <p>Since deg(Ub 1) 6 w 1 and deg(xw + xw k3+k2 + xw k3+k1 ) = w, their
product is a polynomial of degree not exceeding 2 w 1, and hence it ts two
w-bit words for any value of Ub 1. Besides, multiplication of this value by xwk
corresponds to simply displacing it k words to the left. We can dene:
T1[U ]
T0[U ]</p>
        <p>U
(U
k3 + k2)))</p>
        <p>Thus, we can write u xw = (Ub 2; : : : ; Uk T1[Ub 1]; Uk 1 T0[Ub 1]; : : : ; U0; Ub 1).
The values T1 and T0 can be either computed on demand or else pre-computed
and stored in two 2w-entry tables. One easily sees by direct inspection that the
computational cost is that stated by the theorem.</p>
        <p>Applying this theorem for the polynomials adopted by the Curupira-2, we
can evaluate the cost of the transforms @ and its inverse:
p96(x) = x96 + x16 + x13 + x11 + 1 :
@ : (U11; : : : ; U0) x8 = (U10; : : : ; U1 T1[U11]; U0
@ 1 : (U11; : : : ; U0) x 8 = (U0; U11; : : : ; U2 T1[U0]; U1
T0[U11]; U11);</p>
        <p>T0[U0]);
p144(x) = x144 + x56 + x53 + x51 + 1 :
@ : (U17; : : : ; U0) x8 = (U16; : : : ; U6 T1[U17]; U5
@ 1 : (U17; : : : ; U0) x 8 = (U0; U17; : : : ; U7 T1[U0]; U6
p192(x) = x192 + x48 + x45 + x43 + 1 :
@ : (U23; : : : ; U0) x8 = (U22; : : : ; U5 T1[U23]; U 4
@ 1 : (U23; : : : ; U0) x 8 = (U0; U23; : : : ; U6 T1[U0]; U5
T0[U17]; : : : ; U0; U17);</p>
        <p>T0[U0]; : : : ; U1);
T0[U23]; : : : ; U0; U23):</p>
        <p>T0[U0]; : : : ; U1):</p>
        <p>For all key sizes, we have T0 = U (U 5) (U 3) and T1 = (U
3) (U 5).</p>
        <p>These equations show that both @ and @ 1 transforms have the same cost
and, thus, it is also valid for r and its inverse, r 1(u) (@ 1 (u)) q(r).
In contrast, when compared to the key-schedule of the Curupira-1, this second
schedule algorithm has one disadvantage: there is no simple way to reinitialize the
key after a reduced number of rounds. However, in many applications, its higher
speed both during encryption and decryption can be a much more interesting
feature, compensating its lack of cyclicity.
4.4</p>
        <p>The key selection</p>
        <p>r
The round keys (r) 2 Mn eectively used in each round are calculated by means
of the key selection function r : GF(248t) ! Mn, dened in such a way that:
(r) =
r (K) ,
(
i(;rj) = S[Ki(+r)3j ] if i = 0;
i(;rj) = Ki(+r)3j otherwise:</p>
        <p>This way, only the 12 least signicant bytes are taken by r . Also, the S-box is
applied to the bytes that will be combined with the rst row of the block, adding
nonlinearity to the key-schedule, while the bytes for the other rows are taken
directly. The whole process involved in this second version of the key-schedule
algorithm is depicted in Figure 3.</p>
        <p>Fig. 3. The new key-schedule specication (adopted by
Curupira-2)</p>
        <p>
          Security analysis revisited
Since, for both versions of our cipher, the round structure remains the same, most
of the Curupira-1 security analysis [6, section 4] also applies to the
Curupira2: the adoption of the Wide Trail Strategy in combination with a highly
nonlinear S-Box thwarts the most well known modalities of attacks, such as linear,
dierential and integral cryptanalysis. As a consequence, no attack faster than
exhaustive search was found for more than 7 rounds of the cipher. These results
were also conrmed by third party analysis [
          <xref ref-type="bibr" rid="ref43 ref73">31</xref>
          ]. The main dierence between the
two analysis concerns the existence of weak keys and the viability of related-key
attacks.
        </p>
        <p>Weak keys are keys that result in a block cipher mapping with detectable
weaknesses, which normally occurs when the nonlinear operations depend on the
actual key value. This is not the case for the Curupira, where keys are applied
using XOR and all nonlinearity is xed in the S-box. Also, the nonlinear round
constants considerably reduce the probability of xed points in the key-schedule
process, making the existence of weak keys very unlikely.</p>
        <p>
          Related-key attacks exploit a known relationship between dierent unknown
keys, leading to a predictable behavior for the sub-keys generated by the key
schedule. Some of the most widespread techniques involve key dierentials and
key rotations (cf. [
          <xref ref-type="bibr" rid="ref22 ref52">10</xref>
          ]) in order. Due to its slower diusion, it is clear that it
is easier to nd relationships between subsequent sub-keys in Curupira-2 than
in Curupira-1, making the former less resistant to related-key attacks. In fact,
between any two rounds, the dierence in a single internal byte (i.e. in a position
that will only be shifted as a result of the multiplication by x8) results in a
difference on a single byte of the next sub-key, which could be somehow exploited.
In spite of this, some fundamental elements are introduced to the key-schedule
proposed in this paper in order to prevent attacks. First, the nonlinearity
introduced by the key selection thwarts related-key attacks involving dierentials.
Second, the generation of sub-keys does not involve simple rotations, but rather
a multiplication over GF(2 48t) after the addition of nonlinear constants. Third,
the truncation of the sub-keys make some advanced related-key attack variants
such as that described in [13, section 4] improbable. Finally, the slow diusion
in the key schedule is counterbalanced by the round function fast diusion,
assuring that each byte of the key aects many block bytes after a few rounds.
Together, these features make this kind of attacks unlikely to work against the
full cipher.
        </p>
        <p>Furthermore, for key lengths that are larger than the length of one round
key, the existence of sets of keys that produce identical values for at least one
round key is inevitable. Thus, even if the transform adds diusion power to the
key-schedule and prevents the existence of trivial sets with this property, they
should be more easy to nd than in the Curupira-1. Even so, it remains unclear
how such keys could possibly be successfully used in a related-key attack.</p>
        <p>
          As a last remark, the Curupira structure involves only simple operations
such as XORs, shifts and table lookups. As long as the running times for these
transforms are not data-dependent on the target platform, the cipher
implementation can avoid many side-channel attacks (such as timing-attacks [
          <xref ref-type="bibr" rid="ref32 ref62">20</xref>
          ]) in a
straightforward way.
4.6
        </p>
        <p>Implementation and Performance Issues
The Curupira-2 algorithm is very exible in terms of implementation, oering
many memory/performance trade-os. It cannot only use the same techniques
developed for the Curupira-1 round functions [6, section 5]. These include the
usage of a few tables with pre-computed results, but its key-schedule also allow
some useful optimizations depending on resources available.</p>
        <p>The round keys can be either computed on-demand or fully pre-calculated
and stored in a table for ready access. In the rst case, the cipher requires a
reduced amount of RAM memory, since only one sub-key is stored at any given
time. However, as the key-schedule of Curupira-2 is not cyclic, there is no easy
way to compute the rst round key from the last one. An easy way to overcome
this problem is to use two arrays ka and kb to store the rst and the last
subkeys, respectively: when one wants to encrypt, it suces to copy ka into kb and
reuses ka memory space to create the encryption sub-keys; in the end, ka will
have the last key while kb will store the rst one, assuring that both sub-keys
are always available. The decryption is handled analogously. In this case, the
last sub-key could be computed during the cipher initialization. We note that
this strategy is only possible because the key schedule is easily invertible.</p>
        <p>For 6t-byte keys (2 6 t 6 4), the round sub-keys can be calculated in any
direction at the cost of one circular permutation, 2+6(t-2) XORs and one
computation of T0 and T1. Also, T0 and T1 can be either implemented using two
256-bit tables or calculated on-the-y, taking 1 XOR + 2 shifts and 2 XORs +
2 shifts, respectively. In fact, the circular permutation does not need to be
eectively implemented: the same eect can be achieved if the index corresponding
to the most signicant byte of the key is stored and used as the rst byte of
the key for every calculation; this way, it suces to update this index after each
invocation of the @ and @ 1 operations.</p>
        <p>Reviewing the Curupira preliminary calculations [6, section 5.1], the cost
of its round function is 3 R 1 XORs, 2(R 1)=3 xtimes operations and R
S-box lookups per byte. When the key-schedule and key selection are taken
into account, we add at most 1 =3 S-Box lookups, 1 =3 ctimes operations and 2
XORs per key byte and per round in the Curupira-1, while this cost drops to
at most 5=12 S-Box lookups, 5 =8 XORs and 1=12 computations of T0 and T1
per key byte and per round in the Curupira-2. In comparison, Skipjack takes
basically 48 XORs and 16 F-table lookups per encrypted byte. Thus, supposing
that the cost of any of these basic operations are approximately the same and
not counting auxiliary operations not directly related to the ciphers structures
(such as counter increments and key index updates), Curupira-1 with 96-bit
keys and 10 rounds is about (45 + 27) =64 112:5% as Skipjack when the round
keys computed on demand. On the other hand, Curupira-2 with the same
keysize corresponds to (45 + 7 :5)=64 82% of Skipjack computation in the same
conditions. This result should be expected for similar implementations of both
ciphers on byte-oriented platforms.</p>
        <p>
          Furthermore, more powerful processors (32-bit servers, for example) could
implement the s transform in a more ecient way, operating over columns
instead of bytes. Also, the multiplication by x8 can be easily implemented using
a single table that calculates T0 and T1 at the same time, an approach similar
to those adopted in some very optimized versions of AES [
          <xref ref-type="bibr" rid="ref26 ref56">14</xref>
          ].
5
        </p>
        <p>
          Benchmark
In this section, we present the results of our comparison between Curupira,
Skipjack and AES in terms of processing time and memory usage. As discussed
in section 1, the motivation behind the choice of Skipjack resides in the results
presented in [
          <xref ref-type="bibr" rid="ref77">35</xref>
          ] and in [
          <xref ref-type="bibr" rid="ref33 ref63">21</xref>
          ] which shows that, in spite of its low security level, the
cipher is a very interesting choice to achieve a high performance in constrained
platforms, surpassing many other hardware-oriented ciphers like MISTY1 and
Kasumi [1]. AES, on the other hand, provides higher security but is
recommended for less constrained platforms, since it is a less memory-ecient cipher.
Considering these remarks, we decided to develop a deep analysis on the
comparison of Skipjack and Curupira in both constrained and powerful platforms,
while AES is taken into account only on powerful ones. Three dierent platforms
were chosen as testbeds:
{ Microcontroller (8 bits): a RISC microcontroller PIC18F8490 [
          <xref ref-type="bibr" rid="ref41 ref71">29</xref>
          ] equipped
with a 8MHz processor, 768 bytes of RAM and a memory size of 16KB for
code. The reason behind this choice resides in its capacity, slightly superior
to the one presented by the ATmega8535 [
          <xref ref-type="bibr" rid="ref44">2</xref>
          ]. This last device, with a 4 MHz
processor, 8 KB of ash memory and 512 bytes of RAM, is the one used in
the Smart Dust Project [
          <xref ref-type="bibr" rid="ref29 ref59">17</xref>
          ] for sensor networks.
{ Microcontroller Simulator (8 bits): Avrora version 1.6.0 - Beta [
          <xref ref-type="bibr" rid="ref78">36</xref>
          ],
simulating a microcontroller from the ATmega128 [
          <xref ref-type="bibr" rid="ref45">3</xref>
          ] series. The goal of using this
simulator is mainly to validate the results obtained with the PIC processor
in a more powerful, yet tiny platform.
{ Pentium 4 (32 bits): a notebook equipped with Pentium 4 (3.2GHz) and 1GB
of RAM. This platform was chosen to evaluate the proposed optimizations
of the cipher when the resources in the target platform are abundant.
For the 8-bit versions of Curupira and Skipjack, the same C-written
implementations were analyzed in both the PIC18F84908 and the Avrora simulator.
Furthermore, they adopt similar interfaces in each of these platforms, in order
to assure a fair comparison. They also are more speed-oriented than
memoryoriented, since the consumption of energy with processing is proportional to the
number of operations performed by the algorithm, and this is normally
considered the most critical resource in constrained platforms, particularly in WSNs.
        </p>
        <p>For the implementation running on Avrora, as recommended by its
documentation, we adopted avr-objdump and avr-gcc (both GNU utilities) as compilation
tools, while MPLAB IDE v7.60 and MPLAB C18 compiler are used together
with the PIC microcontroller. The speed-optimized versions of each cipher,
resulting from the available compiler optimizations, are the ones considered in this
document. It is important to notice that, even if both platforms include indirect
addressing in their instruction sets, our tests showed that the compilers were
not able to fully take advantage of these instructions, resulting in less than
optimal machine codes when pointers and/or matrices were used. That is the reason
why we decided to evaluate two dierent programming techniques: one that uses
pointers and matrices and another that uses basic-type variables more
intensively, avoiding indirect addressing. While the rst approach normally results
in more exible code (where the size of the keys can be more easily changed,
for example), the second allows more optimized implementations with xed-size
keys (enabling loop unrolling with little loss of compactness)</p>
        <p>The implementations running on the 8-bit platforms are detailed below:</p>
        <p>CURUPIRA (8 bits) using the proposed optimizations for constrained
platforms, we elected two versions of the Curupira for each scheduling
algorithm:
1. Curupirac-1: complete version (meaning that it accepts all key sizes) of
the Curupira-1. It requires two 256-byte tables, one for the S-Box and
another for the ctimes operation and uses many pointers and matrices
2. Curupirac-2: complete version of the Curupira-2, using two 256-byte
tables for the S-Box and xtimes operations. Such as Curupirac-1, it is
also based on indirect addressing instructions.
3. Curupirak96 -1: Curupira-1 restricted to 96-bit keys. It uses the same
tables as the Curupirac-1, but relies on basic types instead of indirect
addressing instructions.
4. Curupirak96 -2: Curupira-2 restricted to 96-bit keys, using the same
tables as the Curupirac-2 but relying on basic-type variables.</p>
        <p>Skipjack (8 bits) two versions were developed according to the specication:
1. Skipjackc: relies on indirect instructions just like Curupirac-1 and
Curupirac-2, providing a useful source of comparison with these ciphers. It
uses a single 256-byte F-table and calculates the round keys on demand.
2. Skipjackk: adopts programming strategies similar to those present in the
Curupirak96 , strongly relying on operations over basic-type variables
instead of matrices and pointers. Such as the Skipjack c, it also uses a
256-byte F-table and calculates the round keys on-the-y.</p>
        <p>
          For the 32-bits platform, we decided to take advantage of some highly
optimized cipher implementations publicly available. The chosen algorithms, written
in Java, were compiled and run on Netbeans IDE 5.5, using the JDK 1.6. The
details of the implementations are given below:
AES (32 bits) we adopted the implementation of Barreto [
          <xref ref-type="bibr" rid="ref17 ref47">5</xref>
          ], which pre-computes
the round keys and employs ten 256-word tables to greatly accelerate the
cipher operation.
        </p>
        <p>CURUPIRA (32 bits) the optimizations in the algorithm are similar to those
present in AES, specially regarding the pre-computation of the round keys
and the intensive use of tables, in the same number as AES.</p>
        <p>
          Skipjack (32 bits) the cipher tested is a Java adaptation of Barreto’s
algorithm [
          <xref ref-type="bibr" rid="ref16 ref46">4</xref>
          ], originally developed in C language. It operates over 16-bit words
and stores some important key-dependent pre-computed values in a
10x256word matrix; this last operation can be seen as a kind of \key-schedule",
since it must be performed each time the cipher key is changed.
5.2
        </p>
        <p>Results: 8-bits platforms
The ciphers memory usage, for both 8-bit platforms, is presented in Table 1. This
table shows that all tested versions of the Curupira take more space in memory
than Skipjack, an expected result considering the higher complexity of its round
function and key-schedule algorithms. Despite this dierence, the tested ciphers
Algorithm
Curupirac-1
Curupirac-2
Curupirak96 -1
Curupirak96 -2
Skipjackc
Skipjackk
are both compact enough to be easily deployed in most constrained platforms,
taking less than 3KB as a whole.</p>
        <p>Both Curupira and Skipjack do not need to pre-compute the round keys
and, thus, they require a reduced amount of RAM. We were not able, however, to
directly measure the RAM usage with the tools available for the tested platforms.
Nevertheless, due to its greater block and key size, we speculate that Curupira
takes a higher amount of RAM than Skipjack. For example, when using two
arrays to store the rst and the last keys, Curupira-2 would take about twice
((96 + 2 96)=(64 + 80)) the amount of RAM needed by Skipjack. These numbers
remain very tiny when compared to pre-computed keys storage, though.</p>
        <p>For the PIC microcontroller, Figure 4 shows the number of CPU cycles, per
byte encrypted, of both tested ciphers. The time measured corresponds to a
single encryption of random blocks using dierent keys. Even if the Curupirac
implementations allow three dierent key sizes, only the 96-bit keys are depicted
in this graph. Also, we explicitly distinguish the processing time required for the
key scheduling and the encryption itself (as Skipjack reuses the original key
cyclically, we considered it part of the encryption instead of a \key-schedule").</p>
        <p>Fig. 4. Comparison between the cipher encryption speeds on the PIC18F8490</p>
        <p>The gure shows that Curupirac-1 and Curupirac-2 are respectively
20% and 45% faster than Skipjack c, with the round keys computed on
demand. Despite this very positive result, it should be carefully considered since
the measured number of cycles includes not only the operations directly involved
in the encryption process but also a non-negligible number of auxiliary ones. The
inuence of these secondary operations is less expressive on both Skipjack k and
Curupirak96 and, as depicted in the right side of Figure 4, Curupirak96 -2 is
still 18% faster than Skipjack, while Curupirak96 -1 is 12% slower. One can
see that the cost of both Curupirak96 versions in this gure are approximately
the ones theoretically calculated in Section 4.6.</p>
        <p>The results on the Avrora Simulator were slightly dierent from those in the
PIC18F8490, as depicted in Figure 5. Skipjack k speed was considerably improved
by this platform change, running about 30% and 4% faster than Curupirak96 -1
and Curupirak96 -2, respectively. A further analysis of the assembly codes show
that these results were caused by the inuence of the compiler, which were able
to apply dierent optimizations to each algorithm. In contrast, this unexpected
behavior was not observed with Curupirac and Skipjackc implementations,
which sustained the relative performances presented on the PIC18F8490.</p>
        <p>Results: 32-bits platforms
The encryption speed of each cipher on the 32-bits platform, with dierent key
sizes (and, thus, number of rounds), is depicted in Figure 6. It is important to
point out that, as all round keys are computed at cipher initialization, there is
no dierence between the encryption speeds of Curupira-1 and Curupira-2.</p>
        <p>We obtained similar results for AES and Curupira with the same number
of rounds (note the additional graph entry where, for the sake of comparison,
both ciphers were tested with the same number of rounds for each key size). This
is an expected result since both ciphers adopt well-known optimizations for the
Wide Trail Strategy family. On the other hand, the modest result of Skipjack
(about 3 times slower than the other ciphers) may seem surprising at rst sight,
since its performance usually is the main factor for its adoption on constrained
platforms. However, this can be explained by its 16-bit oriented operations, very
attractive on constrained processors but less adapted to fully take advantage
of the higher number of bits available on powerful platforms. Both AES and
Curupira, though, can easily be implemented to operate over 32- and 24-bit
words (columns), respectively.</p>
        <p>The processing time involved on the ciphers key-schedules was also measured.
As depicted in Figure 7, while Curupira and AES presented similar speeds,
Skipjack was about 10 times slower. As this operation has to be performed
a single time (at initialization), the impact on the cipher overall operation is
reduced on scenarios where the keys are not frequently changed.
6</p>
        <p>Conclusions
We have described a new and faster key-schedule proposal for the Curupira
block cipher. As a drawback, when compared to the original specication, it has
a lower level of security against related-key attacks. However, according to our
security analysis, both versions of the full cipher are secure against cryptanalysis.</p>
        <p>We also presented a benchmark comparing Curupira, Skipjack and AES in
terms of performance and memory occupation, both on constrained and
powerful platforms. According to the results obtained, the proposed block cipher is
fast and compact, especially when using the new key-schedule presented in this
paper. While Skipjack is considered a good candidate for constrained scenarios,
such as LBAs dependent on sensors and low-power mobile devices, Curupira is
a suitable alternative to increase the security level and potentially improve
performance, introducing a reduced impact in terms of memory usage. Also, when
more powerful platforms are also available, the several optimizations allowed by
the Curupira can be deployed to obtain an even higher performance in the
whole network.</p>
        <p>All together, these results show that the Curupira block cipher is a
useful solution for providing data encryption at low cost, being recommended for
constrained-resource devices and for applications based on such platforms, such
as WSNs and LBAs.</p>
        <p>Future and Ongoing work
We are currently working on the deployment of Curupira on a real WSN in
order to evaluate its impact (especially in terms of energy consumption) in some
signicant scenarios. Also, we are developing a new MAC algorithm named
Marvin, designed to provide a low-cost authenticated-encryption scheme on WSNs,
particularly when used in conjunction with Curupira.</p>
        <p>Acknowledgments
We would like to thank Richard Gold for his useful comments and the review of
this paper.</p>
        <p>References
1. 3GPP. Specication of the 3gpp condentiality and integrity algorithms document
2: Kasumi specication. Technical report, 3GPP, 1999.</p>
        <p>The name
According to a Brazilian legend, the Curupira is a spirit of nature and protector
of the forests. It assumes the form of a boy with red hair, whose feet are turned
backwards. This way, when hunters think they are on the right trail to get it,
they in fact are going to the wrong direction, getting confused and lost. This
should also work against cryptanalysts :-).
Ardagna, Claudio Agostino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Barreto, Paulo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Bettini, Claudio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 61
Carvalho, Tereza . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Domingo-Ferrer, Josep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6, 12
Freni, Dario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Jajodia, Sushil . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61, 82
Margi, Cintia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Mart´ınez-Balleste´, Antoni . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Martin, Rhandi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Mascetti, Sergio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Monreale, Anna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Na¨slund, Mats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Pareschi, Linda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Pedreschi, Dino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Pensa, Ruggero G. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Pinelli, Fabio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Riboni, Daniele . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Sadeghi, Ahmad-Reza . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Samarati, Pierangela . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Simpl´ıcio, Marcos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Solanas, Agusti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Stavrou, Angelos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Visconti, Ivan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Wachsmann, Christian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Wang, Sean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Wu, Qianhong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [RH05]
          <string-name>
            <given-names>M.</given-names>
            <surname>Raya</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.-P.</given-names>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>The security of vehicular ad hoc networks</article-title>
          .
          <source>In SASN'05</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>[Dot06] F. D</surname>
          </string-name>
          <article-title>¨otzer. Privacy issues in vehicular ad hoc networks</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          , vol.
          <volume>3856</volume>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>209</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>[RPH06] M. Raya</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Papadimitratos</surname>
            and
            <given-names>J.-P.</given-names>
          </string-name>
          <string-name>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>Securing vehicular communications</article-title>
          .
          <source>IEEE Wireless Communications Magazine</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>8</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [RH07]
          <string-name>
            <given-names>M.</given-names>
            <surname>Raya</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.-P.</given-names>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>Securing vehicular ad hoc networks</article-title>
          .
          <source>Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>68</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>[RPAJ07] M. Raya</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Papadimitratos</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Aad</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Jungels</surname>
            and
            <given-names>J.-P.</given-names>
          </string-name>
          <string-name>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>Eviction of misbehaving and faulty nodes in vehicular networks</article-title>
          .
          <source>IEEE Journal on Selected Areas in Communications</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>1557</fpage>
          -
          <lpage>1568</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [AFWZ07]
          <string-name>
            <given-names>F.</given-names>
            <surname>Armknecht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Festag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Westhoff</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Zeng</surname>
          </string-name>
          .
          <article-title>Cross-layer privacy enhancement and non-repudiation in vehicular communication</article-title>
          .
          <source>In 4th Workshop on Mobile Ad-Hoc Networks (WMAN)</source>
          , Bern, Switzerland,
          <year>March 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [GBW07]
          <string-name>
            <given-names>J.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.P.</given-names>
            <surname>Baugh</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>A group signature based secure and privacy-preserving vehicular communication framework</article-title>
          .
          <source>In Mobile Networking for Vehicular Environments</source>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>108</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [LSHS07]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.-H.</given-names>
            <surname>Ho</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Shen</surname>
          </string-name>
          .
          <article-title>GSIS: A secure and privacy preserving protocol for vehicular communications</article-title>
          .
          <source>IEEE Transactions on Vehicular Technology</source>
          , vol.
          <volume>56</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>3442</fpage>
          -
          <lpage>3456</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [GGT06]
          <string-name>
            <given-names>C.</given-names>
            <surname>Gamage</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gras</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Tanenbaum</surname>
          </string-name>
          .
          <article-title>An identity-based ring signature scheme with enhanced privacy</article-title>
          .
          <source>In Proceedings of the IEEE SecureComm Conference</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [GGS04]
          <string-name>
            <given-names>P.</given-names>
            <surname>Golle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Greene</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Staddon</surname>
          </string-name>
          .
          <article-title>Detecting and correcting malicious data in VANETs</article-title>
          .
          <source>In Proceedings of the 1st ACM international workshop on Vehicular Ad Hoc Networks</source>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [PP05]
          <string-name>
            <given-names>B.</given-names>
            <surname>Parno</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Perrig</surname>
          </string-name>
          .
          <article-title>Challenges in securing vehicular networks</article-title>
          .
          <source>In Proceedings of the ACM Workshop on Hot Topics in Networks</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [ODS07]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ostermaier</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          <article-title>D¨otzer and M. Strassberger. Enhancing the security of local danger warnings in VANETs - A simulative analysis of voting schemes</article-title>
          .
          <source>In Proceedings of the Second International Conference on Availability, Reliability and Security</source>
          , pp.
          <fpage>422</fpage>
          -
          <lpage>431</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>[RAH06] M. Raya</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Aziz</surname>
            and
            <given-names>J.-P.</given-names>
          </string-name>
          <string-name>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>Efficient secure aggregation in VANETs</article-title>
          .
          <source>In Proceedings of the 3rd International Workshop on Vehicular Ad hoc Networks - VANET 06</source>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>75</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [DDSV08]
          <string-name>
            <given-names>V.</given-names>
            <surname>Daza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Domingo-Ferrer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sebe</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Viejo</surname>
          </string-name>
          .
          <article-title>Trustworthy privacypreserving car-generated announcements in vehicular ad hoc networks</article-title>
          .
          <source>IEEE Transactions on Vehicular Technology</source>
          , Accepted,
          <year>July 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [EP05]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          .
          <article-title>Legislative resolution on the proposal for a directive of the European Parliament and of the Council on the retention of data 3</article-title>
          .
          <string-name>
            <surname>Mihir</surname>
            <given-names>Bellare</given-names>
          </string-name>
          , Alexandra Boldyreva, Anand Desai, and David Pointcheval.
          <article-title>Keyprivacy in public-key encryption</article-title>
          .
          <source>In 7th International Conference on the Theory and Application of Cryptology and Information Security</source>
          , Gold Coast, Gold Coast, Australia, December 9-
          <issue>13</issue>
          ,
          <year>2001</year>
          , Proceedings , volume
          <volume>2248</volume>
          <source>of LNCS</source>
          , pages
          <fpage>566</fpage>
          -
          <lpage>582</lpage>
          . Springer Verlag,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Mihir</given-names>
            <surname>Bellare</surname>
          </string-name>
          , Chanathip Namprempre, and
          <string-name>
            <given-names>Gregory</given-names>
            <surname>Neven</surname>
          </string-name>
          .
          <article-title>Security proofs for identity-based identification and signature schemes</article-title>
          .
          <source>Cryptology ePrint Archive: Report</source>
          <year>2004</year>
          /252,
          <year>September 2004</year>
          . Available at http://eprint.iacr.org/
          <year>2004</year>
          / 252.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Camenisch</surname>
          </string-name>
          , Susan Hohenberger, and
          <string-name>
            <given-names>Anna</given-names>
            <surname>Lysyanskaya. Compact</surname>
          </string-name>
          e-cash.
          <source>In 24th Annual International Conference on the Theory and Applications</source>
          of Cryptographic Techniques, Aarhus, Denmark, May
          <volume>22</volume>
          -26,
          <year>2005</year>
          , Proceedings , volume
          <volume>3494</volume>
          <source>of Lecture Notes on Computer Science (LNCS)</source>
          , pages
          <fpage>302</fpage>
          -
          <lpage>321</lpage>
          . Springer Verlag,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Jan</given-names>
            <surname>Camenisch</surname>
          </string-name>
          and
          <string-name>
            <given-names>Anna</given-names>
            <surname>Lysyanskaya</surname>
          </string-name>
          .
          <article-title>Signature schemes and anonymous credentials from bilinear maps</article-title>
          .
          <source>In 24th Annual International Cryptology Conference</source>
          , Santa Barbara, California, USA,
          <year>August</year>
          15-
          <issue>19</issue>
          ,
          <year>2004</year>
          , Proceedings , volume
          <volume>3152</volume>
          <source>of LNCS</source>
          , pages
          <fpage>56</fpage>
          -
          <lpage>72</lpage>
          . Springer Verlag,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          7.
          <string-name>
            <surname>Nicolas</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Courtois</surname>
          </string-name>
          , Karsten Nohl, and
          <string-name>
            <surname>Sean O'Neil.</surname>
          </string-name>
          <article-title>Algebraic attacks on the Crypto-1 stream cipher in MiFare classic and oyster cards</article-title>
          .
          <source>Cryptology ePrint Archive, Report 2008/166</source>
          ,
          <year>2008</year>
          . Available at http://eprint.iacr.org/
          <year>2008</year>
          / 166/.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Srinivas</given-names>
            <surname>Devadas</surname>
          </string-name>
          , Edward Suh, Sid Paral, Richard Sowell, Tom Ziola, and
          <string-name>
            <given-names>Vivek</given-names>
            <surname>Khandelwal</surname>
          </string-name>
          .
          <article-title>Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications</article-title>
          .
          <source>In IEEE International Conference on RFID</source>
          <year>2008</year>
          ,
          <string-name>
            <surname>Las</surname>
            <given-names>Vegas</given-names>
          </string-name>
          ,
          <string-name>
            <surname>NV</surname>
          </string-name>
          , USA,
          <fpage>16</fpage>
          -
          <lpage>17</lpage>
          April,
          <year>2008</year>
          , pages
          <fpage>58</fpage>
          -
          <lpage>64</lpage>
          . IEEE Computer Society,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Tassos</given-names>
            <surname>Dimitriou</surname>
          </string-name>
          .
          <article-title>A lightweight RFID protocol to protect against traceability and cloning attacks</article-title>
          .
          <source>In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm)</source>
          ,
          <year>September</year>
          ,
          <fpage>05</fpage>
          -
          <lpage>09</lpage>
          ,
          <year>2005</year>
          , pages
          <fpage>59</fpage>
          -
          <lpage>66</lpage>
          . IEEE Computer Society,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          10. Near Field Communication Forum.
          <article-title>Web site of Near Field Communication (NFC) Forum</article-title>
          . http://www.nfc-forum.org/,
          <year>April 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Sony</given-names>
            <surname>Global</surname>
          </string-name>
          .
          <article-title>Web site of Sony FeliCa</article-title>
          . http://www.sony.net/Products/felica/,
          <year>June 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          12.
          <string-name>
            <given-names>Shafi</given-names>
            <surname>Goldwasser</surname>
          </string-name>
          and
          <string-name>
            <given-names>Silvio</given-names>
            <surname>Micali</surname>
          </string-name>
          .
          <article-title>Probabilistic encryption</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          ,
          <volume>28</volume>
          :
          <fpage>270</fpage>
          -
          <lpage>299</lpage>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          13.
          <string-name>
            <surname>Philippe</surname>
            <given-names>Golle</given-names>
          </string-name>
          , Markus Jakobsson, Ari Juels, and
          <string-name>
            <given-names>Paul</given-names>
            <surname>Syverson</surname>
          </string-name>
          .
          <article-title>Universal reencryption for mixnets</article-title>
          .
          <source>In The Cryptographers' Track at the RSA Conference</source>
          <year>2004</year>
          , San Francisco, CA, USA, February
          <volume>23</volume>
          -
          <issue>27</issue>
          ,
          <year>2004</year>
          , Proceedings , volume
          <volume>2964</volume>
          <source>of LNCS</source>
          , pages
          <fpage>163</fpage>
          -
          <lpage>178</lpage>
          . Springer Verlag,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          14.
          <string-name>
            <given-names>Dirk</given-names>
            <surname>Henrici</surname>
          </string-name>
          and
          <string-name>
            <given-names>Paul</given-names>
            <surname>Müuller</surname>
          </string-name>
          .
          <article-title>Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers</article-title>
          .
          <source>In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, March</source>
          ,
          <fpage>14</fpage>
          -
          <lpage>17</lpage>
          ,
          <year>2004</year>
          , pages
          <fpage>149</fpage>
          -
          <lpage>153</lpage>
          . IEEE Computer Society,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          15.
          <string-name>
            <surname>Thomas</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Heydt-Benjamin</surname>
          </string-name>
          ,
          <string-name>
            <surname>Hee-Jin</surname>
            <given-names>Chae</given-names>
          </string-name>
          , Benessa Defend, and
          <string-name>
            <given-names>Kevin</given-names>
            <surname>Fu</surname>
          </string-name>
          .
          <article-title>Privacy for public transportation</article-title>
          .
          <source>In 6th International Workshop</source>
          , PET 2006, Cambridge, UK, June 28-30,
          <year>2006</year>
          , Revised Selected Papers , volume
          <volume>4258</volume>
          <source>of Lecture Notes on Computer Science (LNCS)</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . Springer Verlag,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          16.
          <string-name>
            <given-names>Ari</given-names>
            <surname>Juels</surname>
          </string-name>
          .
          <article-title>RFID security and privacy: A research survey</article-title>
          .
          <source>Journal of Selected Areas in Communication (J-SAC)</source>
          ,
          <volume>24</volume>
          (
          <issue>2</issue>
          ):
          <fpage>381</fpage>
          -
          <lpage>395</lpage>
          ,
          <year>February 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          17.
          <string-name>
            <given-names>Ari</given-names>
            <surname>Juels</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ravikanth</given-names>
            <surname>Pappu</surname>
          </string-name>
          .
          <article-title>Squealing euros: Privacy protection in RFIDenabled banknotes</article-title>
          .
          <source>In 7th International Conference, FC</source>
          <year>2003</year>
          , Guadeloupe, French West Indies,
          <year>January 2003</year>
          ,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Papers</surname>
          </string-name>
          , volume
          <volume>2742</volume>
          <source>of LNCS</source>
          , pages
          <fpage>103</fpage>
          -
          <lpage>121</lpage>
          . Springer Verlag,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          18. Chae Hoon Lim and
          <string-name>
            <given-names>Taekyoung</given-names>
            <surname>Kwon</surname>
          </string-name>
          .
          <article-title>Strong and robust RFID authentication enabling perfect ownership transfer</article-title>
          .
          <source>In 8th International Conference, ICICS</source>
          <year>2006</year>
          ,
          <article-title>Raleigh</article-title>
          ,
          <string-name>
            <surname>NC</surname>
          </string-name>
          , USA, December 47-,
          <year>2006</year>
          , Proceedings , volume
          <volume>4307</volume>
          <source>of LNCS</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . Springer Verlag,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Anna</given-names>
            <surname>Lysyanskaya</surname>
          </string-name>
          .
          <article-title>Signature Schemes and Applications to Cryptographic Protocol Design</article-title>
          .
          <source>PhD thesis</source>
          , Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Cambridge, Massachusetts, USA,
          <year>September 2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          20.
          <string-name>
            <given-names>David</given-names>
            <surname>Molnar</surname>
          </string-name>
          and
          <string-name>
            <given-names>David</given-names>
            <surname>Wagner</surname>
          </string-name>
          .
          <article-title>Privacy and security in library RFID: Issues, practices, and architectures</article-title>
          .
          <source>In Proceedings of the 11th ACM Conference on Computer and Communications Security</source>
          , Washington, DC, USA, October
          <volume>25</volume>
          -
          <issue>29</issue>
          ,
          <year>2004</year>
          , pages
          <fpage>210</fpage>
          -
          <lpage>219</lpage>
          . ACM Press,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Karsten</given-names>
            <surname>Nohl</surname>
          </string-name>
          and
          <string-name>
            <given-names>Henryk</given-names>
            <surname>Plötz</surname>
          </string-name>
          .
          <article-title>MiFare - little security despite obscurity</article-title>
          . http: //events.ccc.de/congress/2007/Fahrplan/events/2378.en.html,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          22.
          <string-name>
            <surname>Miyako</surname>
            <given-names>Ohkubo</given-names>
          </string-name>
          , Koutarou Suzuki, and
          <string-name>
            <given-names>Shingo</given-names>
            <surname>Kinoshita</surname>
          </string-name>
          .
          <article-title>Efficient hash-chain based RFID privacy protection scheme</article-title>
          .
          <source>International Conference on Ubiquitous Computing (UbiComp)</source>
          , Workshop Privacy: Current Status and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          , Nottingham, UK, September,
          <year>2004</year>
          ,
          <year>September 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          23. Ronny Wichers Schreur, Peter van Rossum,
          <string-name>
            <surname>Flavio Garcia</surname>
          </string-name>
          , Wouter Teepe, JaapHenk Hoepman, Bart Jacobs, Gerhard de Koning Gans, Roel Verdult, Ruben Muijrers, and Ravindra Kali andVinesh Kali.
          <article-title>Security flaw in MiFare Classic</article-title>
          . http: //www.sos.cs.ru.nl/applications/rfid/pressrelease.en.html,
          <year>March 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          24.
          <string-name>
            <given-names>NXP</given-names>
            <surname>Semiconductors</surname>
          </string-name>
          .
          <article-title>Web site of MIFARE</article-title>
          . http://mifare.net/, May
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Boyeon</given-names>
            <surname>Song</surname>
          </string-name>
          and
          <string-name>
            <given-names>Chris J.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          .
          <article-title>RFID authentication protocol for low-cost tags</article-title>
          .
          <source>In Proceedings of the First ACM Conference on Wireless Network Security</source>
          , Alexandria, Virginia, USA, March 31 - April 2,
          <year>2008</year>
          . , pages
          <fpage>140</fpage>
          -
          <lpage>147</lpage>
          . ACM Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          26.
          <string-name>
            <surname>Spirtech</surname>
          </string-name>
          .
          <source>CALYPSO functional specification: Card application, version 1</source>
          .3. http: //calypso.spirtech.net/,
          <year>October 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          27.
          <string-name>
            <given-names>Gene</given-names>
            <surname>Tsudik</surname>
          </string-name>
          .
          <article-title>YA-TRAP: Yet Another Trivial RFID Authentication Protocol</article-title>
          .
          <source>In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, March</source>
          <volume>13</volume>
          -17,
          <year>2006</year>
          , volume
          <volume>2802</volume>
          <source>of LNCS</source>
          , pages
          <fpage>640</fpage>
          -
          <lpage>643</lpage>
          . IEEE Computer Society,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          28.
          <string-name>
            <given-names>Pim</given-names>
            <surname>Tuyls</surname>
          </string-name>
          and
          <string-name>
            <given-names>Lejla</given-names>
            <surname>Batina</surname>
          </string-name>
          .
          <article-title>RFID-tags for anti-counterfeiting</article-title>
          .
          <source>In The Cryptographers' Track at the RSA Conference</source>
          <year>2006</year>
          , San Jose, CA, USA, February
          <volume>13</volume>
          -
          <issue>17</issue>
          ,
          <year>2005</year>
          , Proceedings, volume
          <volume>3860</volume>
          <source>of Lecture Notes on Computer Science (LNCS)</source>
          , pages
          <fpage>115</fpage>
          -
          <lpage>131</lpage>
          . Springer Verlag,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          29.
          <string-name>
            <surname>Pim</surname>
            <given-names>Tuyls</given-names>
          </string-name>
          , Boris Škoriç, and Tom Kevenaar, editors.
          <source>Security with Noisy Data - On Private Biometrics, Secure Key Storage, and Anti-Counterfeiting. SpringerVerlag</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          30.
          <string-name>
            <given-names>Serge</given-names>
            <surname>Vaudenay</surname>
          </string-name>
          .
          <article-title>On privacy models for RFID</article-title>
          .
          <source>In 13th International Conference on the Theory and Application of Cryptology and Information Security</source>
          , Kuching, Malaysia, December 2-
          <issue>6</issue>
          ,
          <year>2007</year>
          , Proceedings , volume
          <volume>4833</volume>
          <source>of LNCS</source>
          , pages
          <fpage>68</fpage>
          -
          <lpage>87</lpage>
          . Springer Verlag,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          31.
          <string-name>
            <surname>Stephen</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Weis</surname>
          </string-name>
          , Sanjay E. Sarma, Ronald L.
          <string-name>
            <surname>Rivest</surname>
          </string-name>
          , and Daniel W. Engels.
          <article-title>Security and privacy aspects of low-cost radio frequency identification systems</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          2.
          <string-name>
            <surname>Atmel</surname>
          </string-name>
          . AVR 8-
          <string-name>
            <surname>Bit</surname>
            <given-names>RISC</given-names>
          </string-name>
          <source>processor - ATmega8535 (90LS8535)</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          3.
          <string-name>
            <surname>Atmel</surname>
          </string-name>
          . AVR 8-
          <string-name>
            <surname>Bit</surname>
            <given-names>RISC</given-names>
          </string-name>
          <source>processor - ATmega128 e ATmega128L</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          4.
          <string-name>
            <given-names>P.</given-names>
            <surname>Barreto</surname>
          </string-name>
          .
          <article-title>The Skipjack block cipher { 32 bit implementation</article-title>
          . http://planeta.terra.com.br/informatica/paulobarreto/skipjack32.zip,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P.</given-names>
            <surname>Barreto</surname>
          </string-name>
          .
          <article-title>The AES block cipher (rijndael) { 32 bit implementation</article-title>
          . http://planeta.terra.com.br/informatica/paulobarreto/JEAX.zip,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          6.
          <string-name>
            <given-names>P.</given-names>
            <surname>Barreto</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Simplicio</surname>
          </string-name>
          .
          <article-title>Curupira, a block cipher for constrained platforms</article-title>
          .
          <source>In Anais do 25o</source>
          Simpsio
          <string-name>
            <surname>Brasileiro de Redes de Computadores e Sistemas</surname>
            <given-names>Distribudos - SBRC</given-names>
          </string-name>
          <year>2007</year>
          , volume
          <volume>1</volume>
          , pages
          <fpage>61</fpage>
          {
          <fpage>74</fpage>
          .
          <string-name>
            <surname>SBC</surname>
          </string-name>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          7.
          <string-name>
            <given-names>P. S. L. M.</given-names>
            <surname>Barreto</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Rijmen</surname>
          </string-name>
          .
          <article-title>The Anubis block cipher</article-title>
          .
          <source>In First open NESSIE Workshop</source>
          , Leuven, Belgium,
          <year>November 2000</year>
          . NESSIE Consortium.
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P. S. L. M.</given-names>
            <surname>Barreto</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Rijmen</surname>
          </string-name>
          .
          <article-title>The Khazad legacy-level block cipher</article-title>
          .
          <source>In First open NESSIE Workshop</source>
          , Leuven, Belgium,
          <year>November 2000</year>
          . NESSIE Consortium.
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          9.
          <string-name>
            <given-names>E.</given-names>
            <surname>Biham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Biryukov</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          .
          <article-title>Cryptanalysis of skipjack reduced to 31 rounds using impossible dierentials</article-title>
          .
          <source>In Advances in Cryptology { Eurocrypt'99</source>
          , volume
          <volume>1592</volume>
          of Lecture Notes in Computer Science , pages
          <volume>55</volume>
          {
          <fpage>64</fpage>
          . Springer,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          10.
          <string-name>
            <surname>M. Ciet</surname>
            , G. Piret, and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Quisquater</surname>
          </string-name>
          .
          <article-title>Related-key and slide attacks: Analysis, connections, and improvements - extended abstract</article-title>
          .
          <source>In 23rd Symposium on Information Theory in the Benelux</source>
          ,
          <article-title>Louvain-la-</article-title>
          <string-name>
            <surname>Neuve</surname>
          </string-name>
          , Belgium , pages
          <volume>315</volume>
          {
          <fpage>325</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          11.
          <string-name>
            <given-names>J.</given-names>
            <surname>Daemen</surname>
          </string-name>
          .
          <article-title>Cipher and hash function design strategies based on linear and dierential cryptanalysis</article-title>
          .
          <source>Doctoral dissertation</source>
          , Katholiek Universiteit Leuven,
          <year>March 1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          12.
          <string-name>
            <given-names>J.</given-names>
            <surname>Daemen</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Rijmen</surname>
          </string-name>
          .
          <article-title>The block cipher BKSQ</article-title>
          .
          <source>In Smart Card Research and Applications { CARDIS'98</source>
          , volume
          <volume>1820</volume>
          <source>of Lecture Notes in Computer Science</source>
          , pages
          <volume>236</volume>
          {
          <fpage>245</fpage>
          . Springer,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          13.
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferguson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kelsey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lucks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wagner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Whiting</surname>
          </string-name>
          .
          <article-title>Improved cryptanalysis of Rijndael</article-title>
          .
          <source>In Fast Software Encryption { FSE'</source>
          <year>2000</year>
          , volume
          <volume>1978</volume>
          <source>of Lecture Notes in Computer Science</source>
          , pages
          <volume>213</volume>
          {
          <fpage>230</fpage>
          . Springer,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          14.
          <string-name>
            <given-names>B. R.</given-names>
            <surname>Gladman</surname>
          </string-name>
          .
          <article-title>AES second round implementation experience</article-title>
          . http://fp.gladman.plus.com/cryptography technology/aesr2/index.htm,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          15. G. Guimaraes,
          <string-name>
            <given-names>E.</given-names>
            <surname>Souto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sadok</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kelner</surname>
          </string-name>
          .
          <article-title>Evaluation of security mechanisms in wireless sensor networks</article-title>
          .
          <source>In ICW '05: Proceedings of the 2005 Systems Communications</source>
          , pages
          <volume>428</volume>
          {
          <fpage>433</fpage>
          . IEEE Computer Society,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          16.
          <string-name>
            <surname>M. Healy</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Newe</surname>
            , and
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Lewis</surname>
          </string-name>
          .
          <article-title>Eciently securing data on a wireless sensor network</article-title>
          .
          <source>Journal of Physics</source>
          ,
          <volume>76</volume>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          17.
          <string-name>
            <surname>J. Hill</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Szewczyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Woo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Hollar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Culler</surname>
            , and
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Pister</surname>
          </string-name>
          .
          <article-title>System architecture directions for networked sensors</article-title>
          .
          <source>In Architectural Support for Programming Languages and Operating Systems</source>
          , pages
          <fpage>93</fpage>
          {
          <fpage>104</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          18.
          <string-name>
            <surname>J. Hill</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Szewczyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Woo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Hollar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Culler</surname>
            , and
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Pister</surname>
          </string-name>
          .
          <article-title>System architecture directions for networked sensors</article-title>
          .
          <source>In Architectural Support for Programming Languages and Operating Systems</source>
          , pages
          <fpage>93</fpage>
          {
          <fpage>104</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          19.
          <string-name>
            <surname>C. Karlof</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Sastry</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Wagner</surname>
          </string-name>
          .
          <article-title>Tinysec: a link layer security architecture for wireless sensor networks</article-title>
          .
          <source>In 2nd International Conference on Embedded Networked Sensor Systems { SenSys'2004</source>
          , pages
          <fpage>162</fpage>
          {
          <fpage>175</fpage>
          ,
          <string-name>
            <surname>Baltimore</surname>
          </string-name>
          , USA,
          <year>2004</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          20.
          <string-name>
            <given-names>P.</given-names>
            <surname>Kocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jae</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Jun</surname>
          </string-name>
          .
          <article-title>Introduction to dierential power analysis and related attacks</article-title>
          .
          <source>Technical report</source>
          , Cryptography Research Inc.,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Y. W.</given-names>
            <surname>Law</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Doumen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hartel</surname>
          </string-name>
          .
          <article-title>Survey and benchmark of block ciphers for wireless sensor networks</article-title>
          .
          <source>ACM Transactions on Sensor Networks (TOSN)</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ):
          <volume>65</volume>
          {
          <fpage>93</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          22.
          <string-name>
            <given-names>P.</given-names>
            <surname>Levis</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Culler</surname>
          </string-name>
          .
          <article-title>Maet: a tiny virtual machine for sensor networks</article-title>
          .
          <source>In ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems</source>
          , pages
          <volume>85</volume>
          {
          <fpage>95</fpage>
          . ACM,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          23.
          <string-name>
            <given-names>T.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Bao</surname>
          </string-name>
          .
          <article-title>SenSec design</article-title>
          .
          <source>Technical report</source>
          , InfoComm Security Department,
          <year>February 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          24. D. Liu,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ning</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Li</surname>
          </string-name>
          .
          <article-title>Establishing pairwise keys in distributed sensor networks</article-title>
          .
          <source>In CCS'03: Proceedings of the 10th ACM conference on Computer and communications security</source>
          , pages
          <volume>52</volume>
          {
          <fpage>61</fpage>
          . ACM,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          25.
          <string-name>
            <surname>M. Luk</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Mezzour</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Perrig</surname>
            , and
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Gligor</surname>
          </string-name>
          .
          <article-title>Minisec: A secure sensor network communication architecture</article-title>
          .
          <source>In IPSN'07: Proceedings of the 6th international conference on Information processing in sensor networks</source>
          , pages
          <volume>479</volume>
          {
          <fpage>488</fpage>
          , New York, NY, USA,
          <year>2007</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          26.
          <string-name>
            <surname>F. J. MacWilliams</surname>
            and
            <given-names>N. J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Sloane</surname>
          </string-name>
          .
          <article-title>The theory of error-correcting codes</article-title>
          , volume
          <volume>16</volume>
          .
          <source>North-Holland Mathematical Library</source>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          27.
          <string-name>
            <given-names>M.</given-names>
            <surname>Matsui</surname>
          </string-name>
          .
          <article-title>New block encryption algorithm MISTY</article-title>
          .
          <source>In Fast Software Encryption { FSE'97</source>
          , volume
          <volume>1267</volume>
          of Lecture Notes in Computer Science , pages
          <volume>54</volume>
          {
          <fpage>68</fpage>
          . Springer,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          28.
          <string-name>
            <surname>A. J. Menezes</surname>
          </string-name>
          , P. C. van
          <string-name>
            <surname>Oorschot</surname>
            , and
            <given-names>S. A.</given-names>
          </string-name>
          <string-name>
            <surname>Vanstone</surname>
          </string-name>
          . Handbook of Applied Cryptography. CRC Press, Boca Raton, USA,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          29.
          <string-name>
            <surname>Microchip</surname>
          </string-name>
          .
          <source>PIC18F8490 Datasheet</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          30.
          <string-name>
            <given-names>R.</given-names>
            <surname>Muller</surname>
          </string-name>
          , G. Alonso, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Kossmann</surname>
          </string-name>
          . SwissQM:
          <article-title>Next generation data processing in sensor networks</article-title>
          .
          <source>In CIDR, pages 1{9</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          31.
          <string-name>
            <given-names>J.</given-names>
            <surname>Nakahara</surname>
          </string-name>
          .
          <article-title>Analysis of Curupira block cipher</article-title>
          .
          <source>In Anais do 8o Simpsio Brasileiro em Segurana da Informao e Sistemas Computacionais</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          32. NIST.
          <article-title>Federal Information Processing Standard (FIPS 197) { Advanced Encryption Standard (AES)</article-title>
          .
          <source>National Institute of Standards and Technology</source>
          ,
          <string-name>
            <surname>November</surname>
          </string-name>
          <year>2001</year>
          . http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          33. NSA.
          <source>Skipjack and KEA Algorithm Specications, version 2</source>
          .0 . National Security Agency, May
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          34.
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Rivest</surname>
          </string-name>
          .
          <article-title>The RC5 encryption algorithm</article-title>
          .
          <source>In Fast Software Encryption { FSE'94</source>
          , volume
          <volume>1008</volume>
          of Lecture Notes in Computer Science , pages
          <volume>86</volume>
          {
          <fpage>96</fpage>
          . Springer,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          35.
          <string-name>
            <given-names>R.</given-names>
            <surname>Roman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Alcaraz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lopez</surname>
          </string-name>
          .
          <article-title>A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes</article-title>
          .
          <source>Mobile Networks and Applications</source>
          ,
          <volume>12</volume>
          (
          <issue>4</issue>
          ):
          <volume>231</volume>
          {
          <fpage>244</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          36.
          <string-name>
            <given-names>B.</given-names>
            <surname>Titzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and J.</given-names>
            <surname>Palsberg</surname>
          </string-name>
          .
          <article-title>Avrora scalable simulation of sensor networks with precise timing</article-title>
          .
          <source>Center for Embedded Network Sensing Posters - Paper 93</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>