PUF-HB: A Tamper-Resilient HB Based Authentication Protocol

  • Ghaith Hammouri
  • Berk Sunar
Conference paper

DOI: 10.1007/978-3-540-68914-0_21

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5037)
Cite this paper as:
Hammouri G., Sunar B. (2008) PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin S.M., Gennaro R., Keromytis A., Yung M. (eds) Applied Cryptography and Network Security. ACNS 2008. Lecture Notes in Computer Science, vol 5037. Springer, Berlin, Heidelberg

Abstract

We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF represents physically unclonable functions and fulfills the purpose of providing low-cost tamper-resilient challenge-response authentication. On the other hand, the Hopper Blum (HB) function provides provable cryptographic strength against passive adversaries. By building on an earlier proof of the security of HB +  by Katz et al. [1], we rigorously prove the security of the proposed scheme against active adversaries. While the active adversary model does not include man-in-the-middle attacks, we show that a previously successful man-in-the-middle attack proposed for HB + , does not carry to PUF-HB.

Keywords

HB+ PUF tamper resilience provable security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Ghaith Hammouri
    • 1
  • Berk Sunar
    • 1
  1. 1.Worcester Polytechnic InstituteWorcester

Personalised recommendations