A Novel Probabilistic Passive Attack on the Protocols HB and HB+

We present a very simple probabilistic, passive attack against the protocols HB and HB+. Our attack presents some interesting features: it requires less captured transcripts of protocol executions when compared to previous results; It makes possible to trade the amount of required transcripts for computational complexity; the value of noise used in the protocols HB and HB+ need not be known.

[1]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[2]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[3]  Hideki Imai,et al.  A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication , 2006, IACR Cryptol. ePrint Arch..

[4]  Stephen A. Weis New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .

[5]  Tsutomu Matsumoto,et al.  Human-computer cryptography: an attempt , 1998, CCS '96.

[6]  Tzonelih Hwang,et al.  On the Matsumoto and Imai's Human Identification Scheme , 1995, EUROCRYPT.

[7]  Hideki Imai,et al.  Human Identification Through Insecure Channel , 1991, EUROCRYPT.

[8]  Zbigniew Golebiewski,et al.  Practical Attacks on HB and HB+ Protocols , 2008, IACR Cryptol. ePrint Arch..

[9]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[10]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[11]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[12]  Hideki Imai,et al.  An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication , 2006, INDOCRYPT.

[13]  T. Hwang,et al.  On the Matsumoto and Imai human identification scheme , 1995 .

[14]  Jonathan Katz,et al.  Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.