hHB: A Harder HB+ Protocol

Ahmad Khoureich Ka

2015

Abstract

In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-constrained devices such as RFID tags. The HB+ protocol is based on the Learning Parity with Noise (LPN) problem and is proven secure against active adversaries. Since a man-in-the-middle attack on HB+ due to Gilbert et al. was published, many proposals have been made to improve the HB+ protocol. But none of these was formally proven secure against general man-in-the-middle adversaries. In this paper we present a solution to make the HB+ protocol resistant to general man-in-the-middle adversaries without exceeding the computational and storage capabilities of the RFID tag.

Download


Paper Citation


in Harvard Style

Khoureich Ka A. (2015). hHB: A Harder HB+ Protocol . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 163-169. DOI: 10.5220/0005500001630169

in Bibtex Style

@conference{secrypt15,
author={Ahmad Khoureich Ka},
title={hHB: A Harder HB+ Protocol},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={163-169},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005500001630169},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - hHB: A Harder HB+ Protocol
SN - 978-989-758-117-5
AU - Khoureich Ka A.
PY - 2015
SP - 163
EP - 169
DO - 10.5220/0005500001630169