Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem

被引:5
作者
Bae, KiSeok [2 ]
Moon, SangJae [3 ]
Ha, JaeCheol [1 ]
机构
[1] Hoseo Univ, Dept Informat Secur, Asan, Chungnam, South Korea
[2] Samsung Elect Co Ltd, Syst LSI Business, Yongin, South Korea
[3] Kyungpook Natl Univ, Elect Engn & Comp Sci, Daegu, South Korea
来源
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013) | 2013年
关键词
D O I
10.1109/IMIS.2013.36
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptography) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the if instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.
引用
收藏
页码:167 / 174
页数:8
相关论文
共 26 条
[1]  
A. Corporation, 2011, SPEC ATM 1281 CHIP
[2]  
Anderson R., 1998, Security Protocols. 5th International Workshop Proceedings, P125, DOI 10.1007/BFb0028165
[3]  
[Anonymous], 2005, COMPUTING TATE PAIRI
[4]  
Bajard J. C., 2007, P SPIE, V6697
[5]   The sorcerer's apprentice guide to fault attacks [J].
Bar-El, H ;
Choukri, H ;
Naccache, D ;
Tunstall, M ;
Whelan, C .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :370-382
[6]  
Barenghi L. B. M. P. A., 2010, CRYPTOLOGY EPRINT AR
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Brier E, 2003, LECT NOTES COMPUT SC, V2643, P43
[10]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18