A survey of fault attacks in pairing based cryptography

被引:16
作者
El Mrabet, Nadia [1 ]
Fournier, Jacques J. A. [2 ]
Goubin, Louis [3 ]
Lashermes, Ronan [2 ,3 ]
机构
[1] Univ Paris 08, LIASD, St Denis, France
[2] CEA TechReg, Gardanne, France
[3] UVSQ, PRiSM, Versailles, France
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2015年 / 7卷 / 01期
关键词
Pairing based cryptography; Miller's algorithm; Fault attacks; SIDE CHANNEL ATTACKS; FINAL EXPONENTIATION; IMPLEMENTATIONS; ENCRYPTION;
D O I
10.1007/s12095-014-0114-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography. These make the use of pairings suitable for small and constrained devices (smart phones, smart cards ...) in addition to more powerful platforms. As for any cryptographic algorithm which may be deployed in insecure locations, these implementations must be secure against physical attacks, and in particular fault attacks. In this paper, we present the state-of-the-art of fault attacks against pairing algorithms, more precisely fault attacks against the Miller algorithm and the final exponentiation which are the two parts of a pairing calculation.
引用
收藏
页码:185 / 205
页数:21
相关论文
共 50 条
  • [41] Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks
    Barbu, Guillaume
    Castelnovi, Laurent
    Chabrier, Thomas
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 105 - 125
  • [42] An Elliptic Curve Cryptography based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks
    Chhabra, Anshuman
    Arora, Shivam
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 243 - 246
  • [43] Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
    Kim, Tae Hyun
    Takagi, Tsuyoshi
    Han, Dong-Guk
    Kim, He Won
    Lim, Jongin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 168 - +
  • [44] A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA
    Barenghi, Alessandro
    Bertoni, Guido M.
    Breveglieri, Luca
    Pelosi, Gerardo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (07) : 1864 - 1878
  • [45] Remote Fault Attacks in Multitenant Cloud FPGAs
    Krautter, Jonas
    Gnad, Dennis R. E.
    Tahoori, Mehdi B.
    IEEE DESIGN & TEST, 2022, 39 (04) : 33 - 40
  • [46] The sorcerer's apprentice guide to fault attacks
    Bar-El, H
    Choukri, H
    Naccache, D
    Tunstall, M
    Whelan, C
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 370 - 382
  • [47] Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
    Lopes Gouvea, Conrado Porto
    Lopez, Julio
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 248 - 262
  • [48] Table Redundancy Method for Protecting Against Fault Attacks
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    IEEE ACCESS, 2021, 9 : 92214 - 92223
  • [49] Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
    Viera, Andersson Calle
    Berzati, Alexandre
    Heydemann, Karine
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023, 2024, 14530 : 62 - 83
  • [50] A survey on Conventional Encryption Algorithms of Cryptography
    Yegireddi, Ramesh
    Kumar, R. Kiran
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,