Securing HB against GRS Man-in-the-Middle Attack

نویسندگان

  • Dang Nguyen Duc
  • Kwangjo Kim
چکیده

In Crypto’05, Juels and Weis proposed an efficient and provably secure authentication protocol for RFID devices, namely HB. The protocol is adapted from a human authentication protocol called HB which was proposed earlier by Hopper and Blum. Although HB is more secure than HB in order to be secure in a RFID environment, HB still suffers from an inherent weakness of HB. That is HB+ is not shown to be provably secure against a stronger yet practical type of attack, e.g., man-in-the-middle attack. This problem was quickly demonstrated by Gilbert et al. They presented a man-in-the-middle-attack with linear complexity which can discover a secret information shared by a RFID tag and a RFID reader. Till then, an efficient variant of HB which is secure against active adversaries remains an open question. In this paper, our goal is to solve this open question. We propose an augmented version of HB and show that the new protocol is secure against man-in-themiddle attacks. Comparing to HB, our improved protocol requires only one more secret and minimal additional computation at tag and reader’s side. Therefore, HB∗ is still usable for RFID devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Efficient HB-CM Entity Authentication Protocol

The simple, computationally efficient LPN-based HB-like entity authentication protocols have attracted a great deal of attention in the past few years due to the broad application prospect in low-cost pervasive devices. At present, the most efficient protocol is HB, which is proven to resist the GRS attack under the conjecture that it is secure in the DET-model. In this paper, we introduce an i...

متن کامل

On the Security of HB# against a Man-in-the-Middle Attack

At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB to improve on HB in terms of transmission cost and security against man-in-the-middle attacks. Although the security of HB is formally proven against a certain class of man-in-the-middle adversaries, it is only conjectured for the general case. In this paper, we present a general man-in-the-middle attack against HB and Random-HB, which c...

متن کامل

Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding

Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB protocol performs device authentication based on the learning parity with noise (LPN) problem and simple computational steps, that renders it suitable for resource-constrained devices such as radio frequency identification (RFID) tags. However, it has been sh...

متن کامل

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks

Since the introduction at Crypto’05 by Juels and Weis of the protocol HB, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security. We propose here a new approach to achieve resistance against Man-in-The-Middle attacks. Our requirements – in terms of extra communications and hardware – are surprisingly low.

متن کامل

The Strong HB Problem and its Applications

The HB problem first introduced by Blum and Hopper has been the basis for extremely lightweight authentication protocols for RFID tags [18, 19]. In this paper we introduce a variant of this problem which we call the strong HB problem. We analyze the strong HB problem and give some arguments that support its hardness. We then use the strong HB assumption in two applications of independent intere...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009