Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography

被引:3
作者
El Mrabet, Nadia [1 ,2 ]
Fouotsa, Emmanuel [3 ,4 ]
机构
[1] Univ Paris 08, LIASD, F-93526 St Denis 02, France
[2] CMP Gardanne, SAS, Paris, France
[3] Univ Bamenda, Higher Teachers Training Coll, Dept Math, Bamenda, Cameroon
[4] Univ Caen, LMNO, F-14032 Caen, France
来源
CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015 | 2015年 / 9084卷
关键词
Miller's algorithm; Identity Based Cryptography; Side Channel Attacks; Fault Attacks; Countermeasure; ALGORITHM;
D O I
10.1007/978-3-319-18681-8_21
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography against side channel attacks. In particular, we show that this countermeasure does not protect Miller's algorithm for pairing computation against fault attack. We then give recommendation for a secure implementation of a pairing based protocol using the Miller algorithm.
引用
收藏
页码:259 / 273
页数:15
相关论文
共 37 条
[1]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[2]  
[Anonymous], 2012, Sage for power users
[3]   Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem [J].
Bae, KiSeok ;
Moon, SangJae ;
Ha, JaeCheol .
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, :167-174
[4]  
Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
[5]  
Blomer Johannes, 2013, Constructive Side-Channel Analysis and Secure Design. 4th International Workshop, COSADE 2013. Revised Selected Papers. LNCS 7864, P154, DOI 10.1007/978-3-642-40026-1_10
[6]  
Blomer J., 2014, P FAULT TOL IN PRESS
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[10]  
Cohen H., 2006, HDB ELLIPTIC HYPEREL