Publication | Closed Access
HB N : An HB-like protocol secure against man-in-the-middle attacks.
19
Citations
10
References
2011
Year
Cryptographic PrimitiveEngineeringInformation SecuritySide-channel AttackFormal VerificationHb NHardware SecuritySecure CommunicationSecure ProtocolAuthentication ProtocolNetwork SecurityLightweight Authentication MechanismComputer EngineeringData PrivacyLightweight CryptographyComputer ScienceData SecurityCryptographySimple Authentication ProtocolRfid DevicesLearning Parity
We construct a simple authentication protocol whose security is based solely on the problem of Learning Parity with Noise (LPN) that is secure against Man-in-the-Middle attacks. Our protocol is suitable for RFID devices, whose limited circuit size and power constraints rule out the use of more heavyweight operations such as modular exponentiation. The protocol is extremely simple: both parties compute a noisy bilinear function of their inputs. The proof, however, is quite technical, and we believe that some of our technical tools may be of independent interest.
| Year | Citations | |
|---|---|---|
Page 1
Page 1