Header menu link for other important links
X
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
Published in
2010
Abstract
In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol [6]. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing the provably hard problem of decoding a class of nonlinear codes to passive attacks. We demonstrate that the existing passive attacks([10],[3]) on the HB protocol family, which have contributed to considerable reduction in its effective key-size, do not work against the NLHB protocol. From the evidence, we conclude that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol. Further, for this choice of parameters, we provide an implementation instance for the NLHB protocol for which the Prover/Verifier complexity is lower than the HB protocol, enabling authentication on very low-cost devices like RFID tags. ©2010 IEEE.
About the journal
JournalProceedings of 16th National Conference on Communications, NCC 2010
Open AccessNo
Concepts (20)
  •  related image
    AUTHENTICATION PROTOCOLS
  •  related image
    Choice of parameters
  •  related image
    EFFICIENT AUTHENTICATION
  •  related image
    HARD PROBLEMS
  •  related image
    KEY SIZES
  •  related image
    Light weight
  •  related image
    Linear codes
  •  related image
    LOW-COST DEVICES
  •  related image
    NONLINEAR CODES
  •  related image
    Nonlinear functions
  •  related image
    PASSIVE ATTACKS
  •  related image
    RF-ID TAGS
  •  related image
    Authentication
  •  related image
    Decoding
  •  related image
    Functions
  •  related image
    HYSTERESIS MOTORS
  •  related image
    Network protocols
  •  related image
    RADIO NAVIGATION
  •  related image
    Routers
  •  related image
    Network security