| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Social distancing? Try a better way to work remotely on your online files. Dokkio, a new product from PBworks, can help your team find, organize, and collaborate on your Drive, Gmail, Dropbox, Box, and Slack files. Sign up for free.

View
 

Hopper-Blum (HB)

Page history last edited by PBworks 13 years, 10 months ago

Hopper-Blum (HB) Theory

 

Theory describes two protocols that provide symmetric authentication for low cost RFID tags: the HB protocol and the HB+ protocol. It is claimed that HB is secure against passive attacks, while HB+ is secure against both passive and active attacks. Recently, Gilbert- Robshaw-Sibert have shown that HB+ is vulnerable to active attacks with linear computational and communication complexity, Juels-Weis and Katz-Shin have shown that HB+ is provably secure in a weak security model in which the adversary is not allowed to attack an ongoing authentication session in order to learn the key.

 

Additonal Reading

 

Secure Anonymous RFID Authentication Protocols 

 

Security Parallels Between People and Pervasive Devices

Comments (0)

You don't have permission to comment on this page.