An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication

  • Authors:
  • Marc P. C. Fossorier;Miodrag J. Mihaljević;Hideki Imai;Yang Cui;Kanta Matsuura

  • Affiliations:
  • Department of Electrical Engineering, University of Hawaii, Honolulu;Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, Serbia;Faculty of Science and Engineering, Chuo University, Tokyo, Japan;Institute of Industrial Science (IIS), University of Tokyo, Tokyo, Japan;Institute of Industrial Science (IIS), University of Tokyo, Tokyo, Japan

  • Venue:
  • INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

An algorithm for solving the “learning parity with noise” (LPN) problem is proposed and analyzed. The algorithm originates from the recently proposed advanced fast correlation attacks, and it employs the concepts of decimation, linear combining, hypothesizing and minimum distance decoding. However, as opposed to fast correlation attacks, no preprocessing phase is allowed for the LPN problem. The proposed algorithm appears as more powerful than the best one previously reported known as the BKW algorithm proposed by Blum, Kalai and Wasserman. In fact the BKW algorithm is shown to be a special instance of the proposed algorithm, but without optimized parameters. An improved security evaluation, assuming the passive attacks, of Hopper and Blum HB and HB+ protocols for radio-frequency identification (RFID) authentication is then developed. Employing the proposed algorithm, the security of the HB protocols is reevaluated, implying that the previously reported security margins appear as overestimated.