Advertisement

On the Security Proof of an Authentication Protocol from Eurocrypt 2011

  • Kosei Endo
  • Noboru Kunihiro
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8639)

Abstract

This paper discusses the security of one of authentication protocols proposed by Kiltz et al. at Eurocrypt 2011. Kiltz et al. claimed that the protocol is secure against active attacks. However, they did not give rigorous security proof and just mentioned that the scheme would be secure. In this paper, we introduce a new problem that is as hard as the learning parity with noise problem and prove the active security of the protocol under the assumption that the problem is hard. By combining our result with that of Rizomiliotis and Gritzalis, we obtain complete proof of the Man-in-the-Middle (MIM) security of the protocol.

Keywords

RFID Authentication Protocol LPN Problem HB-Family 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the Inherent Intractability of Certain Coding Problems. IEEE Transactions on Information Theory 24, 384–386 (1978)CrossRefzbMATHGoogle Scholar
  2. 2.
    Bosley, C., Haralambiev, K., Nicolosi, A.: HBN: An HB − like protocol secure against man-in-the-middle attacks. Cryptology ePrint Archive, Report 2011/350 (2011)Google Scholar
  3. 3.
    Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB +  Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339–4342 (2008)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Bringer, J., Chabanne, H., Dottax, E.: HB + + : a Lightweight Authentication Protocol Secure against Some Attacks. In: SecPerU, pp. 28–33. IEEE Computer Society (2006)Google Scholar
  5. 5.
    Duc, D.N., Kim, K.: Securing HB +  against GRS Man-in-the-Middle Attack. In: SCIS (2007)Google Scholar
  6. 6.
    Frumkin, D., Shamir, A.: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. Cryptology ePrint Archive, Report 2009/044 (2009)Google Scholar
  7. 7.
    Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good Variants of HB +  Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156–170. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Gilbert, H., Robshaw, M.J.B., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB + . In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361–378. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Gilbert, H., Robshaw, M.J.B., Sibert, H.: An Active Attack Against HB +  - A Provably Secure Lightweight Authentication Protocol. IACR Cryptology ePrint Archive, 2005:237 (2005)Google Scholar
  10. 10.
    Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB +  Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73–87. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Katz, J., Smith, A.: Analyzing the HB and HB +  Protocols in the “Large Error” Case. IACR Cryptology ePrint Archive, 2006:326 (2006)Google Scholar
  14. 14.
    Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7–26. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  15. 15.
    Lyubashevsky, V., Masny, D.: Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 308–325. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  16. 16.
    Munilla, J., Peinado, A.: HB − MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9), 2262–2267 (2007)CrossRefzbMATHGoogle Scholar
  17. 17.
    Ouafi, K., Overbeck, R., Vaudenay, S.: On the Security of HB# against a Man-in-the-Middle Attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108–124. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  18. 18.
    Pietrzak, K.: Subspace LWE. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 548–563. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  19. 19.
    Rizomiliotis, P., Gritzalis, S.: GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 489–506. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  20. 20.
    Rizomiliotis, P., Gritzalis, S.: Revisiting lightweight authentication protocols based on hard learning problems. In: Buttyán, L., Sadeghi, A.-R., Gruteser, M. (eds.) WiSec, pp. 125–130. ACM (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Kosei Endo
    • 1
  • Noboru Kunihiro
    • 1
  1. 1.The University of TokyoJapan

Personalised recommendations