Practical Attacks on HB and HB+ Protocols - Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Access content directly
Conference Papers Year : 2011

Practical Attacks on HB and HB+ Protocols

Zbigniew Gołębiewski
  • Function : Author
  • PersonId : 1014525
Krzysztof Majcher
  • Function : Author
  • PersonId : 1014526
Filip Zagórski
  • Function : Author
  • PersonId : 1014527
Marcin Zawada
  • Function : Author
  • PersonId : 1014528


HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the “learning parity with noise” (LPN) problem, which was proven to be NP-hard.The best known attack on LPN by Levieil and Fouque [13] requires sub-exponential number of samples and sub-exponential number of operations, which makes that attack impractical for the RFID scenario (one cannot assume to collect exponentially-many observations of the protocol execution).We present a passive attack on HB protocol in detection-based model which requires only linear (in the length of a secret key) number of samples. Number of performed operations is exponential, but attack is efficient for some real-life values of the parameters, i. e. noise $\frac{1}{8}$ and key length 152-bits. Passive attack on HB can be transformed into active one on HB+.
Fichier principal
Vignette du fichier
978-3-642-21040-2_17_Chapter.pdf (407.4 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01573292 , version 1 (09-08-2017)





Zbigniew Gołębiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada. Practical Attacks on HB and HB+ Protocols. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.244-253, ⟨10.1007/978-3-642-21040-2_17⟩. ⟨hal-01573292⟩
193 View
161 Download



Gmail Facebook X LinkedIn More