Good Variants of HB + Are Hard to Find View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008

AUTHORS

Henri Gilbert , Matthew J. B. Robshaw , Yannick Seurin

ABSTRACT

The strikingly simple HB + protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB + have been proposed and these are intended to build on the security of HB + while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB + protocol remains the most attractive member of the HB + family. More... »

PAGES

156-170

Book

TITLE

Financial Cryptography and Data Security

ISBN

978-3-540-85229-2
978-3-540-85230-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12

DOI

http://dx.doi.org/10.1007/978-3-540-85230-8_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000904993


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Robshaw", 
        "givenName": "Matthew J. B.", 
        "id": "sg:person.07740641253.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008", 
    "datePublishedReg": "2008-01-01", 
    "description": "The strikingly simple HB\u2009+\u2009 protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB\u2009+\u2009 have been proposed and these are intended to build on the security of HB\u2009+\u2009 while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB\u2009+\u2009 protocol remains the most attractive member of the HB\u2009+\u2009 family.", 
    "editor": [
      {
        "familyName": "Tsudik", 
        "givenName": "Gene", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-85230-8_12", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-85229-2", 
        "978-3-540-85230-8"
      ], 
      "name": "Financial Cryptography and Data Security", 
      "type": "Book"
    }, 
    "keywords": [
      "low-cost RFID tags", 
      "secret authentication keys", 
      "authentication key", 
      "middle attack", 
      "RFID tags", 
      "range of schemes", 
      "security", 
      "best variant", 
      "attacks", 
      "authentication", 
      "original Hb", 
      "attacker", 
      "Juels", 
      "protocol", 
      "scheme", 
      "key", 
      "tags", 
      "attractive members", 
      "proof", 
      "technique", 
      "elegant proof", 
      "variants", 
      "simple man", 
      "et al", 
      "publications", 
      "Wei", 
      "range", 
      "members", 
      "al", 
      "family", 
      "Gilbert et al", 
      "men", 
      "resistance", 
      "paper", 
      "Hb"
    ], 
    "name": "Good Variants of HB + Are Hard to Find", 
    "pagination": "156-170", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000904993"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-85230-8_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-85230-8_12", 
      "https://app.dimensions.ai/details/publication/pub.1000904993"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:16", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_205.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-85230-8_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'


 

This table displays all metadata directly associated to this object as RDF triples.

108 TRIPLES      22 PREDICATES      60 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-85230-8_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N511c9462d67f43e891c9588f159cf407
4 schema:datePublished 2008
5 schema:datePublishedReg 2008-01-01
6 schema:description The strikingly simple HB +  protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB +  have been proposed and these are intended to build on the security of HB +  while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB +  protocol remains the most attractive member of the HB +  family.
7 schema:editor N8167914d5edc4055bb5d78886010ae27
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N761bd43e17cf4205a9bdf3ab2d8bfee7
11 schema:keywords Gilbert et al
12 Hb
13 Juels
14 RFID tags
15 Wei
16 al
17 attacker
18 attacks
19 attractive members
20 authentication
21 authentication key
22 best variant
23 elegant proof
24 et al
25 family
26 key
27 low-cost RFID tags
28 members
29 men
30 middle attack
31 original Hb
32 paper
33 proof
34 protocol
35 publications
36 range
37 range of schemes
38 resistance
39 scheme
40 secret authentication keys
41 security
42 simple man
43 tags
44 technique
45 variants
46 schema:name Good Variants of HB + Are Hard to Find
47 schema:pagination 156-170
48 schema:productId N2b1fc0ccf6784a5299009f13bb3ddac8
49 N724df7953b114182a32e72e8395dda39
50 schema:publisher Nf6a876fda099472caea0d0738285f901
51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000904993
52 https://doi.org/10.1007/978-3-540-85230-8_12
53 schema:sdDatePublished 2022-08-04T17:16
54 schema:sdLicense https://scigraph.springernature.com/explorer/license/
55 schema:sdPublisher N5efe9e9f14be4543b97c68310060fe18
56 schema:url https://doi.org/10.1007/978-3-540-85230-8_12
57 sgo:license sg:explorer/license/
58 sgo:sdDataset chapters
59 rdf:type schema:Chapter
60 N0b3a057ae3f1456199cfd389c2b7ead5 rdf:first sg:person.011724731171.01
61 rdf:rest rdf:nil
62 N2b1fc0ccf6784a5299009f13bb3ddac8 schema:name doi
63 schema:value 10.1007/978-3-540-85230-8_12
64 rdf:type schema:PropertyValue
65 N4d54a11699b245eb8161013be9e1b7d6 schema:familyName Tsudik
66 schema:givenName Gene
67 rdf:type schema:Person
68 N511c9462d67f43e891c9588f159cf407 rdf:first sg:person.012771236207.08
69 rdf:rest N978d0418e89d423aba5c0a20c70c05c1
70 N5efe9e9f14be4543b97c68310060fe18 schema:name Springer Nature - SN SciGraph project
71 rdf:type schema:Organization
72 N724df7953b114182a32e72e8395dda39 schema:name dimensions_id
73 schema:value pub.1000904993
74 rdf:type schema:PropertyValue
75 N761bd43e17cf4205a9bdf3ab2d8bfee7 schema:isbn 978-3-540-85229-2
76 978-3-540-85230-8
77 schema:name Financial Cryptography and Data Security
78 rdf:type schema:Book
79 N8167914d5edc4055bb5d78886010ae27 rdf:first N4d54a11699b245eb8161013be9e1b7d6
80 rdf:rest rdf:nil
81 N978d0418e89d423aba5c0a20c70c05c1 rdf:first sg:person.07740641253.74
82 rdf:rest N0b3a057ae3f1456199cfd389c2b7ead5
83 Nf6a876fda099472caea0d0738285f901 schema:name Springer Nature
84 rdf:type schema:Organisation
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
89 schema:name Data Format
90 rdf:type schema:DefinedTerm
91 sg:person.011724731171.01 schema:affiliation grid-institutes:grid.89485.38
92 schema:familyName Seurin
93 schema:givenName Yannick
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
95 rdf:type schema:Person
96 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
97 schema:familyName Gilbert
98 schema:givenName Henri
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
100 rdf:type schema:Person
101 sg:person.07740641253.74 schema:affiliation grid-institutes:grid.89485.38
102 schema:familyName Robshaw
103 schema:givenName Matthew J. B.
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74
105 rdf:type schema:Person
106 grid-institutes:grid.89485.38 schema:alternateName Orange Labs, 38–40 rue du General Leclerc, Issy les Moulineaux, France
107 schema:name Orange Labs, 38–40 rue du General Leclerc, Issy les Moulineaux, France
108 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...