| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

Hopper-Blum (HB)

Page history last edited by PBworks 14 years, 3 months ago

Hopper-Blum (HB) Theory

 

Theory describes two protocols that provide symmetric authentication for low cost RFID tags: the HB protocol and the HB+ protocol. It is claimed that HB is secure against passive attacks, while HB+ is secure against both passive and active attacks. Recently, Gilbert- Robshaw-Sibert have shown that HB+ is vulnerable to active attacks with linear computational and communication complexity, Juels-Weis and Katz-Shin have shown that HB+ is provably secure in a weak security model in which the adversary is not allowed to attack an ongoing authentication session in order to learn the key.

 

Additonal Reading

 

Secure Anonymous RFID Authentication Protocols 

 

Security Parallels Between People and Pervasive Devices

Comments (0)

You don't have permission to comment on this page.