What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol? - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?

Nadia El Mrabet

Résumé

We complete the study of [16] and [20] about the Miller's algorithm. The Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.
Fichier principal
Vignette du fichier
ISA09.pdf (461.29 Ko) Télécharger le fichier
Origine : Fichiers éditeurs autorisés sur une archive ouverte
Loading...

Dates et versions

lirmm-00387057 , version 1 (22-05-2009)

Identifiants

  • HAL Id : lirmm-00387057 , version 1

Citer

Nadia El Mrabet. What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?. ISA'09: The 3rd International Conference on Information and Assurance, Jun 2009, Séoul, South Korea. pp.122-134. ⟨lirmm-00387057⟩
84 Consultations
340 Téléchargements

Partager

Gmail Facebook X LinkedIn More