DocumentCode :
2921457
Title :
A practical Differential Power Analysis attack against the Miller algorithm
Author :
El Mrabet, Nadia ; Flottes, Marie Lise ; Di Natale, Giorgio
Author_Institution :
LIRMM Lab., Montpellier, France
fYear :
2009
fDate :
12-17 July 2009
Firstpage :
308
Lastpage :
311
Abstract :
Pairings permit several protocol simplifications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Channel Attacks can be therefore applied to find this secret. We realize a Differential Power Analysis(DPA) against the Miller algorithm, the central step to compute the Weil, Tate and Ate pairing. We show that the countermeasure which consist in setting the secret during a pairing computation at the first parameter is not sufficient to prevent a DPA attack.
Keywords :
cryptographic protocols; Miller algorithm; differential power analysis; identity based cryptographic protocol; pairing based cryptography; protocol simplifications; secret entry; side channel attacks; Algorithm design and analysis; Circuits; Cryptographic protocols; Differential equations; Elliptic curve cryptography; Elliptic curves; Galois fields; Identity-based encryption; Jacobian matrices; Laboratories; DPA; Miller Algorithm; Pairing; Pairing Based Cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Microelectronics and Electronics, 2009. PRIME 2009. Ph.D.
Conference_Location :
Cork
Print_ISBN :
978-1-4244-3733-7
Electronic_ISBN :
978-1-4244-3734-4
Type :
conf
DOI :
10.1109/RME.2009.5201339
Filename :
5201339
Link To Document :
بازگشت