Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

Authenticating Pervasive Devices with Human Protocols

Ari Juels

Citation: A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols. Crypto ’05.

Abstract: Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share similar capabilities with another weak computing device: people.

These similarities motivate the adoption of techniques from human-computer security to the pervasive computing setting. This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices. We offer an improved, concrete proof of security for the HB protocol against passive adversaries.

This paper also offers a new, augmented version of the HB protocol, named HB+, that is secure against active adversaries. The HB+, protocol is a novel, symmetric authentication protocol with a simple, low-cost implementation. We prove the security of the HB+, protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.

Click here for paper

Full Publication List