Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7739))

Abstract

“Lapin” is a new RFID authentication protocol proposed at FSE 2012. “Ring-LPN” (Ring-Learning-Parity-with-Noise) is a new computational problem proposed in the same paper; there is a proof relating the security of Lapin to the difficulty of Ring-LPN. This paper presents an attack against Ring-LPN-512 and Lapin-512. The attack is not practical but nevertheless violates specific security claims in the FSE 2012 paper.

The Wolf: “I knew it! Never trust a bunny!” Twitchy: “Never trust a bunny!” [9].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. — (no editor): Second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU 2006), 29 June 2006, Lyon, France. Institute of Electrical and Electronics Engineers (2006). See [6]

    Google Scholar 

  2. Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: STOC 2000 [28], pp. 435–440 (2000); see also newer version [3]. Citations in this document: §2

    Google Scholar 

  3. Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50, 506–519 (2003); see also older version [2]. Citations in this document: §1, §3

    Google Scholar 

  4. Boyd, C. (ed.): Advances in cryptology—ASIACRYPT 2001: proceedings of the 7th international conference on the theory and application of cryptology and information security held on the Gold Coast, December 9-13, 2010, proceedings. LNCS, vol. 2248. Springer (2001). ISBN 3-540-42987-5. See [16]

    Google Scholar 

  5. Bringer, J., Chabanne, H.: Trusted-HB: a low-cost version of HB +  secure against man-in-the middle attacks. IEEE Transactions on Information Theory, 4339–4342 (2008), http://eprint.iacr.org/2008/042 . Citations in this document: §1

  6. Bringer, J., Chabanne, H., Dottax, E.: HB + + : a lightweight authentication protocol secure against some attacks. In: [1], pp. 28–33 (2006). Citations in this document:§1

    Google Scholar 

  7. Canteaut, A. (ed.): Fast software encryption, 2012. 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. LNCS, vol. 7549. Springer (2012). ISBN 978-3-642-34046-8. See [15]

    Google Scholar 

  8. Duc, D.N., Kim, K.: Securing HB +  against GRS man-in-the-middle attack. In: Proceedings of SCIS 2007 (2007). Citations in this document: §1

    Google Scholar 

  9. Edwards, C., Edwards, T., Leech, T.: Hoodwinked! (2005), http://www.imdb.com/title/tt0443536/ . Citations in this document: §*

  10. Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Proceedings of the ECRYPT Workshop on Lightweight Cryptography, Louvain-la-Neuve, Belgium, November 2011; Africacrypt 2012, to appear (2011), http://perso.uclouvain.be/fstandae/lightweight_ciphers/ . Citations in this document: §1

  11. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES 2004 [17], pp. 357–370 (2004). Citations in this document: §1

    Google Scholar 

  12. Frumkin, D., Shamir, A.: Un-Trusted-HB: security vulnerabilities of Trusted-HB (2009), http://eprint.iacr.org/2009/044 Citations in this document: §1

  13. Gilbert, H., Robshaw, M.J.B., Seurin, Y.: \({\rm HB^\sharp}\): increasing the security and efficiency of HB + . In: EUROCRYPT 2008 [27], pp. 361–378 (2008). Citations in this document: §1

    Google Scholar 

  14. Hästad, J.: Some optimal inapproximability results. In: STOC 1997 [21], pp. 1–10 (1997). Citations in this document: §2

    Google Scholar 

  15. Heyse, S., Kiltz, E., Lyubashesvky, V., Paar, C., Pietrzak, K.: Lapin: An efficient authentication protocol based on Ring-LPN. In: FSE 2012 [7], pp. 346–365 (2012). Citations in this document: §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §2, §2, §2

    Google Scholar 

  16. Hopper, N.J., Blum, M.: Secure human identification protocols. In: ASIACRYPT 2001 [4], pp. 52–66 (2001). Citations in this document: §1, §2

    Google Scholar 

  17. Joye, M., Quisquater, J.-J. (eds.): Cryptographic hardware and embedded systems—CHES 2004: 6th international workshop, Cambridge, MA, USA, August11-13, 2004, proceedings. LNCS, vol. 3156. Springer (2004). ISBN 3-540-22666-4. See [11]

    Google Scholar 

  18. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO 2005 [26], pp. 293–308 (2005). Citations in this document: §1

    Google Scholar 

  19. Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient authentication from hard learning problems. In: EUROCRYPT 2011 [24], pp. 7–26 (2011). Citations in this document: §1, §2

    Google Scholar 

  20. Kirchner, P.: Improved generalized birthday attack (2011), http://eprint.iacr.org/2011/377 . Citations in this document: §1, §1, §3, §3, §3, §4, §4

  21. Leighton, F.T., Shor, P.W. (eds.): Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997. ACM (1997). See [14]

    Google Scholar 

  22. Levieil, É., Fouque, P.-A.: An improved LPN algorithm. In: SCN 2006 [25], pp.348–359 (2006). Citations in this document: §1, §1, §1, §1, §1, §1, §1, §1, §3, §3, §4, §4

    Google Scholar 

  23. Munilla, J., Peinado, A.: HB-MP: a further step in the HB-family of lightweight authentication protocols. Computer Networks 51, 2262–2267 (2007). Citations in this document: §1

    Google Scholar 

  24. Paterson, K.G. (ed.): Advances in cryptology—EUROCRYPT 2011, 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011, proceedings. LNCS, vol. 6632. Springer (2011). ISBN 978-3-642-20464-7. See [19]

    Google Scholar 

  25. De Prisco, R., Yung, M. (eds.): Security and cryptography for networks, 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006, proceedings. LNCS, vol. 4116. Springer (2006). ISBN 3-540-38080-9. See [22]

    Google Scholar 

  26. Shoup, V. (ed.): Advances in cryptology—CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14-18, 2005, proceedings. LNCS, vol. 3621. Springer (2005). ISBN 3-540-28114-2. See [18]

    Google Scholar 

  27. Smart, N.P. (ed.): Advances in cryptology—EUROCRYPT 2008, 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13-17, 2008, proceedings. LNCS, vol. 4965. Springer (2008). ISBN 978-3-540-78966-6. See [13]

    Google Scholar 

  28. Yao, F.F., Luks, E.M. (eds.): Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA. ACM (2000). ISBN 1-58113-184-4. See [2]

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bernstein, D.J., Lange, T. (2013). Never Trust a Bunny. In: Hoepman, JH., Verbauwhede, I. (eds) Radio Frequency Identification. Security and Privacy Issues. RFIDSec 2012. Lecture Notes in Computer Science, vol 7739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36140-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36140-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36139-5

  • Online ISBN: 978-3-642-36140-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics