HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks

@article{Bringer2006HBAL,
  title={HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks},
  author={J. Bringer and H. Chabanne and Emmanuelle Dottax},
  journal={Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)},
  year={2006},
  pages={28-33}
}
  • J. Bringer, H. Chabanne, Emmanuelle Dottax
  • Published 2006
  • Computer Science
  • Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)
  • At Crypto'05, Juels and Weis introduce HB+, an enhancement of the Hopper and Blum (HB) authentication protocol. This protocol HB+ is proven secure against active attacks, though preserving HB's advantages: mainly, requiring so few resources to run that it can be implemented on an RFID tag. However, in a wider adversarial model, Gilbert, Robshaw and Sibert exhibit a very effective attack against H+. We here show how a modification of the HB + protocol thwarts Gilbert et al's attack. The… CONTINUE READING
    256 Citations

    Figures and Topics from this paper

    hHB: A Harder HB+ Protocol
    • 4
    • PDF
    hHB: A harder HB+ protocol
    • Ahmad Khoureich Ka
    • Computer Science
    • 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)
    • 2015
    • 3
    An Improved HB++ Protocol Against Man-in-Middle Attack in RFID System
    • He Lei, Gan Yong, L. Na-na, Z. Tao
    • Computer Science
    • 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing
    • 2008
    • 3
    HBN: An HB-like protocol secure against man-in-the-middle attacks
    • 16
    • PDF
    Parallel and Concurrent Security of the HB and HB+ Protocols
    • 120
    • PDF
    Good Variants of HB+ Are Hard to Find
    • 82
    • Highly Influenced
    • PDF
    Trusted-HB: A Low-Cost Version of HB $^+$ Secure Against Man-in-the-Middle Attacks
    • 81
    • PDF
    GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
    • 22
    • PDF

    References

    SHOWING 1-10 OF 26 REFERENCES
    An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
    • 328
    • PDF
    Authenticating Pervasive Devices with Human Protocols
    • 745
    • PDF
    A scalable and provably secure hash-based RFID protocol
    • G. Avoine, P. Oechslin
    • Computer Science
    • Third IEEE International Conference on Pervasive Computing and Communications Workshops
    • 2005
    • 366
    • PDF
    Secure Human Identification Protocols
    • 545
    • PDF
    Untraceable RFID tags via insubvertible encryption
    • 174
    • PDF
    Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • Dirk Henrici, P. Müller
    • Computer Science
    • IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
    • 2004
    • 552
    • PDF
    Universal Re-encryption for Mixnets
    • 431
    • PDF
    Provable Security Against Differential Cryptanalysis
    • 202
    • PDF