Survey on recent development about lightweight authentication protocol based on LPN problem

Designation of authentication protocol for low-cost Radio Frequency IDentification(RFID) is a hot research topic. The challenge is to develop secure protocols using lightweight algorithms, which can be easily applied in the RFID tags. A current trend is to design such protocols upon the Learning Parity with Noise (LPN) problem. This paper presents the recent development of lightweight authentication protocols based on LPN problem. After describing several typical protocols in this field, the main features of security and availability about each protocol are analyzed, and then the critical problems which should be solved in practical applications are also pointed out.

[1]  Richard J. Lipton,et al.  Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.

[2]  Man Young Sung,et al.  HB-MP++ protocol: An ultra light-weight authentication protocol for RFID system , 2009, 2009 IEEE International Conference on RFID.

[3]  Shai Halevi,et al.  Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population , 2009, ArXiv.

[4]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[5]  Martin Hell,et al.  A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[7]  Julien Bringer,et al.  HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[8]  Jean-Jacques Quisquater,et al.  FPGA Implementation of SQUASH , 2008 .

[9]  Gildas Avoine,et al.  Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly , 2010, RFIDSec.

[10]  Refaat M. Mohamed,et al.  RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation , 2011, 2011 5th International Conference on Network and System Security.

[11]  Xiaolin Cao,et al.  F-HB: An Efficient Forward Private Protocol , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.

[12]  Shahram Khazaei,et al.  Distinguishing Attack on Grain , 2005 .

[13]  Adi Shamir,et al.  Un-Trusted-HB: Security Vulnerabilities of Trusted-HB , 2009, IACR Cryptol. ePrint Arch..

[14]  Andrew Thangaraj,et al.  NLHB: A non-linear Hopper-Blum protocol , 2010, 2010 IEEE International Symposium on Information Theory.

[15]  Andrew Thangaraj,et al.  NLHB : A light-weight, provably-secure variant of the HB protocol using simple non-linear functions , 2010, 2010 National Conference On Communications (NCC).

[16]  Xiaolin Cao,et al.  F-HB+: A Scalable Authentication Protocol for Low-Cost RFID Systems , 2011 .

[17]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[18]  Xiaowen Zhang,et al.  Implementation and performance testing of the SQUASH RFID authentication protocol , 2010, 2010 IEEE Long Island Systems, Applications and Technology Conference.

[19]  Cornel Turcu,et al.  Current Trends and Challenges in RFID , 2011 .

[20]  Mohammad Reza Sohizadeh Abyaneh On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[21]  Tianjie Cao,et al.  RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[22]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[23]  Christophe De Cannière,et al.  Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.

[24]  Yannick Seurin,et al.  HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.

[25]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[26]  Zhou Yong Design and Analysis of Cryptographic Protocols for RFID , 2006 .

[27]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[28]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[29]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..

[30]  Julien Bringer,et al.  Trusted-HB: A Low-Cost Version of HB $^+$ Secure Against Man-in-the-Middle Attacks , 2008, IEEE Transactions on Information Theory.

[31]  Serge Vaudenay,et al.  On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.

[32]  Kristiyan Haralambiev,et al.  HBN: An HB-like protocol secure against man-in-the-middle attacks , 2011, IACR Cryptol. ePrint Arch..

[33]  Xuefei Leng,et al.  HB-MP+ Protocol: An Improvement on the HB-MP Protocol , 2008, 2008 IEEE International Conference on RFID.

[34]  Fangjun Wu,et al.  A Structural Complexity Metric for Software Components , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[35]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.