• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Social distancing? Try a better way to work remotely on your online files. Dokkio, a new product from PBworks, can help your team find, organize, and collaborate on your Drive, Gmail, Dropbox, Box, and Slack files. Sign up for free.


Hopper-Blum (HB)

Page history last edited by PBworks 13 years, 10 months ago

Hopper-Blum (HB) Theory


Theory describes two protocols that provide symmetric authentication for low cost RFID tags: the HB protocol and the HB+ protocol. It is claimed that HB is secure against passive attacks, while HB+ is secure against both passive and active attacks. Recently, Gilbert- Robshaw-Sibert have shown that HB+ is vulnerable to active attacks with linear computational and communication complexity, Juels-Weis and Katz-Shin have shown that HB+ is provably secure in a weak security model in which the adversary is not allowed to attack an ongoing authentication session in order to learn the key.


Additonal Reading


Secure Anonymous RFID Authentication Protocols 


Security Parallels Between People and Pervasive Devices

Comments (0)

You don't have permission to comment on this page.