Differential Power Analysis against the Miller Algorithm

Nadia El Mrabet 1 Giorgio Di Natale 2 Marie-Lise Flottes 2 Bruno Rouzeyre 2 Jean-Claude Bajard 3, 1
1 ARITH - Arithmétique informatique
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
2 SysMIC - Conception et Test de Systèmes MICroélectroniques
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Pairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Channel Attacks can be therefore applied to nd this secret. We realize a Differential Power Analysis(DPA) against the Miller algorithm, the central step to compute the Weil, Tate and Ate pairing. Keywords: Pairing, Miller Algorithm, Pairing Based Cryptography, SCA, DPA.
Document type :
Reports
Complete list of metadatas

Cited literature [4 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00323684
Contributor : Nadia El Mrabet <>
Submitted on : Monday, September 22, 2008 - 6:08:13 PM
Last modification on : Thursday, February 7, 2019 - 4:33:36 PM
Long-term archiving on : Monday, October 8, 2012 - 1:21:19 PM

File

Version_23_07_08.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : lirmm-00323684, version 1

Citation

Nadia El Mrabet, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean-Claude Bajard. Differential Power Analysis against the Miller Algorithm. RR-08021, 2008. ⟨lirmm-00323684⟩

Share

Metrics

Record views

416

Files downloads

448