Download presentation
Presentation is loading. Please wait.
Published byMalcolm Garry Williamson Modified over 9 years ago
1
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably Secure HB-like Lightweight Authentication Protocol June 26-29, Singapore 1 ACNS 2012
2
Contents Motivation - RFID The HB family The HB# protocol Design Security The GHB# protocol Design Security Implementation issues Conclusions June 26-29, Singapore 2 ACNS 2012
3
Motivation - RFID June 26-29, Singapore ACNS 2012 3 Radio Frequency Identification A technology that enables the electronic and wireless labeling and identification of objects, humans and animals Replaces barcodes Electronic device that can store and transmit data to a reader in a contactless manner using radio waves Microchip Antenna
4
Applications June 26-29, Singapore ACNS 2012 4 Practically everywhere Auto Immobilizers Automated Vehicle Id Animal Tracking Conveyor Belt Forklift Dock Door Handheld Point of Sale Smart Shelves Credit Card Electronic Identity
5
Main Challenges June 26-29, Singapore ACNS 2012 5 Security Confidentiality of stored data Integrity/authenticity Impersonation Privacy Anonymity Untraceability Normally, cryptography can solve all these problems. Restrictions: Low cost Limited hardware and energy We need new lightweight algorithms!!
6
The HB family of protocols June 26-29, Singapore ACNS 2012 6 A set of ultra-lightweight authentication protocols initiated by Hopper and Blum’s work (the HB protocol) proposed initially for human identification Then proposed for RFID tags Based on the LPN problem
7
The HB family June 26-29, Singapore ACNS 2012 7 HB (2001) HB+ (2005) HB++ (2006) HB-MP (2007) HB-MP+(2008) HB* (2007) HB# (2008) Subspace LPN based protocols (2011)
8
Three attack models (1/3) June 26-29, Singapore ACNS 2012 8 PASSIVE-model 1. Eavesdrop Tag-Reader 2. Impersonate the Tag DET – model 1. Interrogate the Tag (Reader is not present) 2. Impersonate the Tag MIM – model 1. Modify the messages between Tag-Reader (SOS – learn to authentication result) 2. Impersonate the Tag GRS-attack: Modify only the messages send by the Reader
9
Three attack models (2/3) DET-model June 26-29, Singapore ACNS 2012 9
10
Three attack models (3/3) MIM-model June 26-29, Singapore ACNS 2012 10 GRS-attack when ONLY b i can be modified
11
The HB# protocol June 26-29, Singapore ACNS 2012 11 Gilbert, H., Robshaw, M., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB+. In: Proceedings of Eurocrypt, Springer LNCS, vol. 4965, pp. 361-378, (2008) 1. Random-HB#: X,Y random 2. HB#: X,Y Toeplitz Matrices
12
The HB# protocol’s security June 26-29, Singapore ACNS 2012 12 Based on MHB: an extension of the HB puzzle HB# is secure against the PASSIVE, DET, GRS-attack There is a MIM attack Ouafi, K., Overbeck, R., Vaudenay, S.: On the Security of HB# against a Man- in- the-Middle Attack. In: Proceedings of Asiacrypt, Springer LNCS, vol. 5350, pp.108-124 (2008)
13
Vectorial Boolean Functions June 26-29, Singapore ACNS 2012 13 Vectorial Boolean Functions with m inputs and n outputs:
14
Gold Boolean Functions June 26-29, Singapore ACNS 2012 14 Gold, R.: Maximal recursive sequences with 3-valued recursive crosscorrelation functions. IEEE Transactions on Information Theory, vol. 14, pp. 154-156, 1968 Power functions on a field where Algebraic Degree = 2 Balanced APN High nonlinearity
15
The GHB# protocol June 26-29, Singapore ACNS 2012 15 Modify the HB# Φ is a Gold Boolean function!
16
Complexity and other issues June 26-29, Singapore ACNS 2012 16 Practically the same the behavior as the HB# protocol False acceptance rate False rejection rate Storage complexity. The memory cost for the tag; i.e. the storage for the two secret matrices, is (k X +k Y )m bits. Communication complexity. The protocol requires (k X +k Y + m) bits to be transferred in total.
17
Security analysis June 26-29, Singapore ACNS 2012 17 Provably PASSIVE, DET and MIM secure It is based on the MHB puzzle like the HB# (Actually, similarly to the HB# proofs our reduction uses rewinding) The resistance against the MIM attacks is due to the APN property of the Gold function
18
Intuitive approach June 26-29, Singapore ACNS 2012 18 From the presentation of Ouafi, K., Overbeck, R., Vaudenay, S.: On the Security of HB# against a Man- in-the-Middle Attack. In: Proceedings of Asiacrypt, Springer LNCS, vol. 5350, pp.108-124 (2008) HB# Estimation of the acceptance rate GHB# The acceptance rate is random! Remember Φ is APN!!!!!
19
Implementation Issues June 26-29, Singapore ACNS 2012 19 Implementation of the Gold function Optimal normal basis Requires 2m + 1 AND gates and 2m XOR gates. Complexity Comparison between GHB# and HB#.
20
Conclusions June 26-29, Singapore ACNS 2012 20 RFID need ultra-lightweight protocols The HB family is the most promising candidate GHB# is provably secure It has the pros and cons of HB# Further research is needed to improve implementation complexity
21
Thank you for your attention June 26-29, Singapore ACNS 2012 21 Questions??
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.