What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?

Nadia El Mrabet 1
1 ARITH - Arithmétique informatique
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : We complete the study of [16] and [20] about the Miller's algorithm. The Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.
Type de document :
Communication dans un congrès
ISA'09: The 3rd International Conference on Information and Assurance, Jun 2009, Séoul, South Korea. Springer-Verlag, 5576, pp.122-134, 2009, Lecture Notes in Computer Science. 〈www.sersc.org/ISA2009/〉
Liste complète des métadonnées

Littérature citée [19 références]  Voir  Masquer  Télécharger

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00387057
Contributeur : Nadia El Mrabet <>
Soumis le : vendredi 22 mai 2009 - 19:18:35
Dernière modification le : jeudi 24 mai 2018 - 15:59:21
Document(s) archivé(s) le : jeudi 10 juin 2010 - 23:44:08

Fichier

ISA09.pdf
Fichiers éditeurs autorisés sur une archive ouverte

Identifiants

  • HAL Id : lirmm-00387057, version 1

Collections

Citation

Nadia El Mrabet. What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?. ISA'09: The 3rd International Conference on Information and Assurance, Jun 2009, Séoul, South Korea. Springer-Verlag, 5576, pp.122-134, 2009, Lecture Notes in Computer Science. 〈www.sersc.org/ISA2009/〉. 〈lirmm-00387057〉

Partager

Métriques

Consultations de la notice

111

Téléchargements de fichiers

161