Abstract
“Lapin” is a new RFID authentication protocol proposed at FSE 2012. “Ring-LPN” (Ring-Learning-Parity-with-Noise) is a new computational problem proposed in the same paper; there is a proof relating the security of Lapin to the difficulty of Ring-LPN. This paper presents an attack against Ring-LPN-512 and Lapin-512. The attack is not practical but nevertheless violates specific security claims in the FSE 2012 paper.
The Wolf: “I knew it! Never trust a bunny!” Twitchy: “Never trust a bunny!” [9].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
— (no editor): Second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU 2006), 29 June 2006, Lyon, France. Institute of Electrical and Electronics Engineers (2006). See [6]
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: STOC 2000 [28], pp. 435–440 (2000); see also newer version [3]. Citations in this document: §2
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50, 506–519 (2003); see also older version [2]. Citations in this document: §1, §3
Boyd, C. (ed.): Advances in cryptology—ASIACRYPT 2001: proceedings of the 7th international conference on the theory and application of cryptology and information security held on the Gold Coast, December 9-13, 2010, proceedings. LNCS, vol. 2248. Springer (2001). ISBN 3-540-42987-5. See [16]
Bringer, J., Chabanne, H.: Trusted-HB: a low-cost version of HB + secure against man-in-the middle attacks. IEEE Transactions on Information Theory, 4339–4342 (2008), http://eprint.iacr.org/2008/042 . Citations in this document: §1
Bringer, J., Chabanne, H., Dottax, E.: HB + + : a lightweight authentication protocol secure against some attacks. In: [1], pp. 28–33 (2006). Citations in this document:§1
Canteaut, A. (ed.): Fast software encryption, 2012. 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. LNCS, vol. 7549. Springer (2012). ISBN 978-3-642-34046-8. See [15]
Duc, D.N., Kim, K.: Securing HB + against GRS man-in-the-middle attack. In: Proceedings of SCIS 2007 (2007). Citations in this document: §1
Edwards, C., Edwards, T., Leech, T.: Hoodwinked! (2005), http://www.imdb.com/title/tt0443536/ . Citations in this document: §*
Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Proceedings of the ECRYPT Workshop on Lightweight Cryptography, Louvain-la-Neuve, Belgium, November 2011; Africacrypt 2012, to appear (2011), http://perso.uclouvain.be/fstandae/lightweight_ciphers/ . Citations in this document: §1
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES 2004 [17], pp. 357–370 (2004). Citations in this document: §1
Frumkin, D., Shamir, A.: Un-Trusted-HB: security vulnerabilities of Trusted-HB (2009), http://eprint.iacr.org/2009/044 Citations in this document: §1
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: \({\rm HB^\sharp}\): increasing the security and efficiency of HB + . In: EUROCRYPT 2008 [27], pp. 361–378 (2008). Citations in this document: §1
Hästad, J.: Some optimal inapproximability results. In: STOC 1997 [21], pp. 1–10 (1997). Citations in this document: §2
Heyse, S., Kiltz, E., Lyubashesvky, V., Paar, C., Pietrzak, K.: Lapin: An efficient authentication protocol based on Ring-LPN. In: FSE 2012 [7], pp. 346–365 (2012). Citations in this document: §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §1, §2, §2, §2
Hopper, N.J., Blum, M.: Secure human identification protocols. In: ASIACRYPT 2001 [4], pp. 52–66 (2001). Citations in this document: §1, §2
Joye, M., Quisquater, J.-J. (eds.): Cryptographic hardware and embedded systems—CHES 2004: 6th international workshop, Cambridge, MA, USA, August11-13, 2004, proceedings. LNCS, vol. 3156. Springer (2004). ISBN 3-540-22666-4. See [11]
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO 2005 [26], pp. 293–308 (2005). Citations in this document: §1
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient authentication from hard learning problems. In: EUROCRYPT 2011 [24], pp. 7–26 (2011). Citations in this document: §1, §2
Kirchner, P.: Improved generalized birthday attack (2011), http://eprint.iacr.org/2011/377 . Citations in this document: §1, §1, §3, §3, §3, §4, §4
Leighton, F.T., Shor, P.W. (eds.): Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997. ACM (1997). See [14]
Levieil, É., Fouque, P.-A.: An improved LPN algorithm. In: SCN 2006 [25], pp.348–359 (2006). Citations in this document: §1, §1, §1, §1, §1, §1, §1, §1, §3, §3, §4, §4
Munilla, J., Peinado, A.: HB-MP: a further step in the HB-family of lightweight authentication protocols. Computer Networks 51, 2262–2267 (2007). Citations in this document: §1
Paterson, K.G. (ed.): Advances in cryptology—EUROCRYPT 2011, 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011, proceedings. LNCS, vol. 6632. Springer (2011). ISBN 978-3-642-20464-7. See [19]
De Prisco, R., Yung, M. (eds.): Security and cryptography for networks, 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006, proceedings. LNCS, vol. 4116. Springer (2006). ISBN 3-540-38080-9. See [22]
Shoup, V. (ed.): Advances in cryptology—CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14-18, 2005, proceedings. LNCS, vol. 3621. Springer (2005). ISBN 3-540-28114-2. See [18]
Smart, N.P. (ed.): Advances in cryptology—EUROCRYPT 2008, 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13-17, 2008, proceedings. LNCS, vol. 4965. Springer (2008). ISBN 978-3-540-78966-6. See [13]
Yao, F.F., Luks, E.M. (eds.): Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA. ACM (2000). ISBN 1-58113-184-4. See [2]
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bernstein, D.J., Lange, T. (2013). Never Trust a Bunny. In: Hoepman, JH., Verbauwhede, I. (eds) Radio Frequency Identification. Security and Privacy Issues. RFIDSec 2012. Lecture Notes in Computer Science, vol 7739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36140-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-36140-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36139-5
Online ISBN: 978-3-642-36140-1
eBook Packages: Computer ScienceComputer Science (R0)