Good Variants of HB + Are Hard to Find View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008

AUTHORS

Henri Gilbert , Matthew J. B. Robshaw , Yannick Seurin

ABSTRACT

The strikingly simple HB + protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB + have been proposed and these are intended to build on the security of HB + while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB + protocol remains the most attractive member of the HB + family. More... »

PAGES

156-170

Book

TITLE

Financial Cryptography and Data Security

ISBN

978-3-540-85229-2
978-3-540-85230-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12

DOI

http://dx.doi.org/10.1007/978-3-540-85230-8_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000904993


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Robshaw", 
        "givenName": "Matthew J. B.", 
        "id": "sg:person.07740641253.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008", 
    "datePublishedReg": "2008-01-01", 
    "description": "The strikingly simple HB\u2009+\u2009 protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB\u2009+\u2009 have been proposed and these are intended to build on the security of HB\u2009+\u2009 while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB\u2009+\u2009 protocol remains the most attractive member of the HB\u2009+\u2009 family.", 
    "editor": [
      {
        "familyName": "Tsudik", 
        "givenName": "Gene", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-85230-8_12", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-85229-2", 
        "978-3-540-85230-8"
      ], 
      "name": "Financial Cryptography and Data Security", 
      "type": "Book"
    }, 
    "keywords": [
      "low-cost RFID tags", 
      "secret authentication keys", 
      "authentication key", 
      "middle attack", 
      "RFID tags", 
      "range of schemes", 
      "security", 
      "best variant", 
      "attacks", 
      "authentication", 
      "original Hb", 
      "attacker", 
      "Juels", 
      "protocol", 
      "scheme", 
      "key", 
      "tags", 
      "attractive members", 
      "proof", 
      "technique", 
      "elegant proof", 
      "variants", 
      "simple man", 
      "et al", 
      "publications", 
      "Wei", 
      "range", 
      "members", 
      "al", 
      "family", 
      "Gilbert et al", 
      "men", 
      "resistance", 
      "paper", 
      "Hb"
    ], 
    "name": "Good Variants of HB + Are Hard to Find", 
    "pagination": "156-170", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000904993"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-85230-8_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-85230-8_12", 
      "https://app.dimensions.ai/details/publication/pub.1000904993"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:16", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_205.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-85230-8_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'


 

This table displays all metadata directly associated to this object as RDF triples.

108 TRIPLES      22 PREDICATES      60 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-85230-8_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Ned07c0bef3b6431391b4eff79420ef9f
4 schema:datePublished 2008
5 schema:datePublishedReg 2008-01-01
6 schema:description The strikingly simple HB +  protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB +  have been proposed and these are intended to build on the security of HB +  while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB +  protocol remains the most attractive member of the HB +  family.
7 schema:editor N5a1e11d5e2ae43928229bd97b8b781be
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N33482d20a92448f9880ae5a5d528c49b
11 schema:keywords Gilbert et al
12 Hb
13 Juels
14 RFID tags
15 Wei
16 al
17 attacker
18 attacks
19 attractive members
20 authentication
21 authentication key
22 best variant
23 elegant proof
24 et al
25 family
26 key
27 low-cost RFID tags
28 members
29 men
30 middle attack
31 original Hb
32 paper
33 proof
34 protocol
35 publications
36 range
37 range of schemes
38 resistance
39 scheme
40 secret authentication keys
41 security
42 simple man
43 tags
44 technique
45 variants
46 schema:name Good Variants of HB + Are Hard to Find
47 schema:pagination 156-170
48 schema:productId N63ca4764684c42c8ada395220e96a8c9
49 N94aa9ac5acc849abb5466ebf10774dcb
50 schema:publisher N436e5c326fa94039b2acd6ba518ef014
51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000904993
52 https://doi.org/10.1007/978-3-540-85230-8_12
53 schema:sdDatePublished 2022-08-04T17:16
54 schema:sdLicense https://scigraph.springernature.com/explorer/license/
55 schema:sdPublisher N1393921ee5c64818b3fc880629fd9d1c
56 schema:url https://doi.org/10.1007/978-3-540-85230-8_12
57 sgo:license sg:explorer/license/
58 sgo:sdDataset chapters
59 rdf:type schema:Chapter
60 N1393921ee5c64818b3fc880629fd9d1c schema:name Springer Nature - SN SciGraph project
61 rdf:type schema:Organization
62 N33482d20a92448f9880ae5a5d528c49b schema:isbn 978-3-540-85229-2
63 978-3-540-85230-8
64 schema:name Financial Cryptography and Data Security
65 rdf:type schema:Book
66 N436e5c326fa94039b2acd6ba518ef014 schema:name Springer Nature
67 rdf:type schema:Organisation
68 N5a1e11d5e2ae43928229bd97b8b781be rdf:first Na5f82946be3f45e088e12ee31a370d3f
69 rdf:rest rdf:nil
70 N63ca4764684c42c8ada395220e96a8c9 schema:name dimensions_id
71 schema:value pub.1000904993
72 rdf:type schema:PropertyValue
73 N725c8d6c5716475fa6be94df2f405a96 rdf:first sg:person.07740641253.74
74 rdf:rest Nec36beccf3394526aac126971ce74b99
75 N94aa9ac5acc849abb5466ebf10774dcb schema:name doi
76 schema:value 10.1007/978-3-540-85230-8_12
77 rdf:type schema:PropertyValue
78 Na5f82946be3f45e088e12ee31a370d3f schema:familyName Tsudik
79 schema:givenName Gene
80 rdf:type schema:Person
81 Nec36beccf3394526aac126971ce74b99 rdf:first sg:person.011724731171.01
82 rdf:rest rdf:nil
83 Ned07c0bef3b6431391b4eff79420ef9f rdf:first sg:person.012771236207.08
84 rdf:rest N725c8d6c5716475fa6be94df2f405a96
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
89 schema:name Data Format
90 rdf:type schema:DefinedTerm
91 sg:person.011724731171.01 schema:affiliation grid-institutes:grid.89485.38
92 schema:familyName Seurin
93 schema:givenName Yannick
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
95 rdf:type schema:Person
96 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
97 schema:familyName Gilbert
98 schema:givenName Henri
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
100 rdf:type schema:Person
101 sg:person.07740641253.74 schema:affiliation grid-institutes:grid.89485.38
102 schema:familyName Robshaw
103 schema:givenName Matthew J. B.
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74
105 rdf:type schema:Person
106 grid-institutes:grid.89485.38 schema:alternateName Orange Labs, 38–40 rue du General Leclerc, Issy les Moulineaux, France
107 schema:name Orange Labs, 38–40 rue du General Leclerc, Issy les Moulineaux, France
108 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...