DocumentCode :
3590089
Title :
How can we succeed the fault attack on PACE protocol
Author :
Serraj, Taoufik ; Azizi, Abdelmalek ; Ismaili, Moulay Chrif
Author_Institution :
Dept. of Math. & Comput. Sci., Mohammed First Univ., Oujda, Morocco
fYear :
2014
Firstpage :
59
Lastpage :
63
Abstract :
Fault analysis attacks are a class of side channel attacks which exploit faults that can occur in the implementation of a cryptosystem to discover the secret keys partially or fully. In this paper we propose a fault analysis attack on The Password Authenticated Connection Establishment Protocol (PACE) to recover the session key, also we discuss the possibility of mounting Tunstall-Mukhopadhyay attack to expose the long term key (Password), and we prove that despite its theoretical security in BPR model, DY model or eCK model, PACE can be insecure in this new setting.
Keywords :
cryptographic protocols; private key cryptography; BPR model; DY model; PACE protocol; Tunstall-Mukhopadhyay attack; cryptosystem; eCK model; fault analysis attacks; password authenticated connection establishment protocol; side channel attacks; Cryptography; Decision support systems; Lead; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Codes, Cryptography and Communication Systems (WCCCS), 2014 5th Workshop on
Print_ISBN :
978-1-4799-7053-7
Type :
conf
DOI :
10.1109/WCCCS.2014.7107920
Filename :
7107920
Link To Document :
بازگشت