HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Reports

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based Protocol ?

Nadia El Mrabet 1
1 ARITH - Arithmétique informatique
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : We complete the study of [16] and [20] about the Miller algorithm. The Miller algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.
Document type :
Reports
Complete list of metadata

Cited literature [17 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00323685
Contributor : Nadia El Mrabet Connect in order to contact the contributor
Submitted on : Monday, September 22, 2008 - 6:10:31 PM
Last modification on : Tuesday, March 15, 2022 - 12:55:40 PM
Long-term archiving on: : Friday, June 4, 2010 - 11:41:19 AM

File

DERNIER_FAUTE.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : lirmm-00323685, version 1

Citation

Nadia El Mrabet. What about vulnerability to a fault attack of the Miller algorithm during an Identity Based Protocol ?. RR-08022, 2008. ⟨lirmm-00323685⟩

Share

Metrics

Record views

78

Files downloads

83