Securing HB against GRS Man-in-the-Middle Attack
نویسندگان
چکیده
In Crypto’05, Juels and Weis proposed an efficient and provably secure authentication protocol for RFID devices, namely HB. The protocol is adapted from a human authentication protocol called HB which was proposed earlier by Hopper and Blum. Although HB is more secure than HB in order to be secure in a RFID environment, HB still suffers from an inherent weakness of HB. That is HB+ is not shown to be provably secure against a stronger yet practical type of attack, e.g., man-in-the-middle attack. This problem was quickly demonstrated by Gilbert et al. They presented a man-in-the-middle-attack with linear complexity which can discover a secret information shared by a RFID tag and a RFID reader. Till then, an efficient variant of HB which is secure against active adversaries remains an open question. In this paper, our goal is to solve this open question. We propose an augmented version of HB and show that the new protocol is secure against man-in-themiddle attacks. Comparing to HB, our improved protocol requires only one more secret and minimal additional computation at tag and reader’s side. Therefore, HB∗ is still usable for RFID devices.
منابع مشابه
Secure and Efficient HB-CM Entity Authentication Protocol
The simple, computationally efficient LPN-based HB-like entity authentication protocols have attracted a great deal of attention in the past few years due to the broad application prospect in low-cost pervasive devices. At present, the most efficient protocol is HB, which is proven to resist the GRS attack under the conjecture that it is secure in the DET-model. In this paper, we introduce an i...
متن کاملOn the Security of HB# against a Man-in-the-Middle Attack
At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB to improve on HB in terms of transmission cost and security against man-in-the-middle attacks. Although the security of HB is formally proven against a certain class of man-in-the-middle adversaries, it is only conjectured for the general case. In this paper, we present a general man-in-the-middle attack against HB and Random-HB, which c...
متن کاملShort: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been sh...
متن کاملTrusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Since the introduction at Crypto’05 by Juels and Weis of the protocol HB, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security. We propose here a new approach to achieve resistance against Man-in-The-Middle attacks. Our requirements – in terms of extra communications and hardware – are surprisingly low.
متن کاملThe Strong HB Problem and its Applications
The HB problem first introduced by Blum and Hopper has been the basis for extremely lightweight authentication protocols for RFID tags [18, 19]. In this paper we introduce a variant of this problem which we call the strong HB problem. We analyze the strong HB problem and give some arguments that support its hardness. We then use the strong HB assumption in two applications of independent intere...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009