-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathhbplus.html
More file actions
103 lines (87 loc) · 6.74 KB
/
hbplus.html
File metadata and controls
103 lines (87 loc) · 6.74 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
<!doctype html>
<html lang="en">
<head>
<title>HB+ Authentication Protocol</title>
<meta name="keywords" content="HB+, HB+ authentication, authentication protocol, low-cost authentication, Hopper, Blum" />
<meta name="description" content="Information about the HB+ Authentication protocol" />
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="style.css" type="text/css" />
</head>
<body>
<div class="container">
<div class="page-header">
<a href="index.html" class="back-link">Stephen A. Weis</a>
<h1>HB+ Authentication</h1>
</div>
<div class="section">
<p>HB+ is a secure authentication protocol that is extremely simple to
implement in hardware. Its low implementation cost could make HB+ useful
in preventing "skimming", counterfeiting, or cloning of cheap pervasive
devices like RFID tags. HB+ was developed with <a href="http://www.rsasecurity.com/rsalabs/node.asp?id=2029">Ari Juels</a> of
RSA Security and was presented at <a href="http://www.iacr.org/conferences/crypto2005/">Crypto'05</a>. HB+ builds
on a protocol for human-to-computer authentication originally developed
by <a href="http://www-users.cs.umn.edu/~hopper/">Nick Hopper</a> and
<a href="http://www.cs.cmu.edu/~mblum/">Manuel Blum</a> (HB).</p>
<p>Here are <a href="pdfs/lpn-slides.pdf">presentation slides</a> from
Crypto'05 and another <a href="http://www.cs.stevens.edu/~klivings/protocol.html">page about HB/HB+</a>.</p>
</div>
<div class="section">
<h3>HB+ Bibliography</h3>
<ul>
<li><a href="http://eprint.iacr.org/2009/044">"Un-Trusted-HB: Security Vulnerabilities of Trusted-HB"</a><br />
Dmitry Frumkin and Adi Shamir<br />
<i>Synopsis:</i> Frumkin and Shamir show attacks against Trusted-HB</li>
<li><a href="http://eprint.iacr.org/2008/028.pdf">"HB#: Increasing the Security and Efficiency of HB+"</a><br />
Henri Gilbert, Matthew J.B. Robshaw and Yannick Seurin<br />
<a href="http://www.iacr.org/conferences/eurocrypt2008/Default.aspx">EuroCrypt 2008</a><br />
<i>Synopsis:</i> Gilbert, Robshaw, and Seurin offer a variant of HB+ named HB# that is resistant to man-in-the-middle attacks.</li>
<li><a href="http://www.springerlink.com/content/196791v64p37n130/">"PUF-HB: A Tamper-Resilient HB Based Authentication Protocol"</a><br />
Ghaith Hammouri and <a href="http://ece.wpi.edu/~sunar/">Berk Sunar</a><br />
<a href="http://acns2008.cs.columbia.edu/">ACNS 2008</a><br />
<i>Synopsis:</i> Hammouri and Sunar make use of physically unclonable functions (PUFs) to make a tamper-resilient HB variant.</li>
<li><a href="http://arxiv.org/abs/0802.0603v1">"Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks"</a><br />
<a href="http://bringer.univ-tln.fr/">Julien Bringer</a> and Herve Chabanne<br />
<i>Synopsis:</i> Bringer and Chabanne offer a new HB+ variant that makes use of Krawczyk's hash-based authentication schemes using Toeplitz-based LFSR constructions, and is resistant to man-in-the-middle attacks.</li>
<li><a href="http://eprint.iacr.org/2006/326.pdf">"Analyzing the HB and HB+ Protocols in the ``Large Error'' Case"</a><br />
<a href="http://www.cs.umd.edu/~jkatz/">Jonathan Katz</a> and Adam Smith<br />
<a href="http://eprint.iacr.org/2006/326">Eprint Archives</a><br />
<i>Synopsis:</i> Katz and Smith show how to extend proofs of HB+ security to the general case where the noise parameter ε < 1/2.</li>
<li>"An attack of HB+ in the detection-based model"<br />
Eric Levieil and <a href="http://www.di.ens.fr/~fouque/">Pierre-Alain Fouque</a><br />
<a href="http://www.dia.unisa.it/conferences/SCN06/">Security and Cryptography for Networks</a> - September 2006<br />
<i>Synopsis:</i> This paper offers an LPN algorithm with better constant factors. See <a href="pdfs/weis-phd-thesis.pdf">Section 2.8 of my PhD thesis</a> for a discussion of HB+ key lengths.</li>
<li>"HB++: a Lightweight Authentication Protocol Secure against Some Attacks"<br />
<a href="http://bringer.univ-tln.fr/">Julien Bringer</a> and Herve Chabanne and Emmanuelle Dottax<br />
Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, June 2006<br />
<i>Synopsis:</i> This paper presents a new HB+ variant that is claimed to be secure against man-in-the-middle attacks.</li>
<li><a href="http://eprint.iacr.org/2005/461.pdf">"Parallel and Concurrent Security of the HB and HB+ Protocols"</a><br />
<a href="http://www.cs.umd.edu/~jkatz/">Jonathan Katz</a> and <a href="http://www.cs.umd.edu/~sunny/">Ji Sun Shin</a><br />
<a href="http://www.iacr.org/conferences/eurocrypt2006/">Advances in Cryptology -- EUROCRYPT</a>, 2006<br />
<i>Synopsis:</i> This paper shows that HB+ is secure under concurrent and parallel composition, greatly reducing the round complexity to a constant three rounds.</li>
<li><a href="http://eprint.iacr.org/2005/237.pdf">"An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol"</a><br />
Henri Gilbert and <a href="http://www.isg.rhul.ac.uk/~mrobshaw/">Matt Robshaw</a> and Herve Sibert, 2005<br />
<i>Synopsis:</i> This paper presents a man-in-the-middle attack against HB+. This attack requires many failed authentications to extract HB+ keys.</li>
<li><a href="pdfs/lpn-paper.pdf">"Authenticating Pervasive Devices with Human Protocols"</a><br />
Ari Juels and Stephen A. Weis<br />
<a href="http://www.iacr.org/conferences/crypto2005/">Advances in Cryptology -- CRYPTO 2005</a>,
<a href="pdfs/lpn-slides.pdf">Presentation Slides</a><br />
LNCS, volume 3621, pages 293-308, 2005<br />
<i>Synopsis:</i> This is the original HB+ paper.</li>
<li><a href="http://citeseer.ist.psu.edu/hopper01secure.html">"Secure Human Identification Protocols"</a><br />
Nicholas J. Hopper and Manuel Blum<br />
<a href="http://www.iacr.org/conferences/asiacrypt2001/mirror/">Advances in Cryptology - ASIACRYPT 2001</a>,
LNCS, volume 2248, pages 52-66, 2001<br />
<i>Synopsis:</i> This is the original paper that presents the HB protocol, which HB+ is based on.</li>
</ul>
</div>
</div>
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-448164-1"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'UA-448164-1');
</script>
</body>
</html>