DocumentCode :
1392106
Title :
HBC entity authentication for low-cost pervasive devices
Author :
Li, Zuyi ; Gong, Guang
Author_Institution :
Cisco Syst. Co., Ottawa, ON, Canada
Volume :
6
Issue :
3
fYear :
2012
Firstpage :
212
Lastpage :
218
Abstract :
The HB-like entity authentication protocols for low-cost pervasive devices have attracted a great deal of attention because of their simplicity, computational efficiency and solid security foundation on a well-studied hard problem-learning parity with noise. By far, the most efficient protocol is HB#, which is provably resistant to the GRS attack under the conjecture that it is secure in the DET-model. However, in order to achieve 80-bit security, a typical HB# authentication key comprises over 1000 bits, which imposes considerable storage burdens on resource-constrained devices. In this study, the authors propose a new HB-like protocol: HBC. The protocol makes use of a special type of circulant matrix, in contrast to the Toeplitz matrix in HB#, to significantly reduce storage consumption and overcome a subtle security proof inefficacy in HB#. In addition, the authors introduce a masking technique that substantially increases noise level from an adversary´s standpoint, and thus improves protocol performance. The authors demonstrate that 613-bit authentication key suffices for 80-bit security in the HBC protocol, which is quite competitive and more appealing for low-cost devices.
Keywords :
Toeplitz matrices; cryptographic protocols; ubiquitous computing; DET model; GRS attack; HB# authentication key; HBC entity authentication protocol; Toeplitz matrix; circulant matrix; masking technique; pervasive device; resource constrained device; security proof;
fLanguage :
English
Journal_Title :
Information Security, IET
Publisher :
iet
ISSN :
1751-8709
Type :
jour
DOI :
10.1049/iet-ifs.2011.0052
Filename :
6397166
Link To Document :
بازگشت