What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol? - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Conference Papers Year : 2009

What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?

Nadia El Mrabet

Abstract

We complete the study of [16] and [20] about the Miller's algorithm. The Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.
Fichier principal
Vignette du fichier
ISA09.pdf (461.29 Ko) Télécharger le fichier
Origin Publisher files allowed on an open archive
Loading...

Dates and versions

lirmm-00387057 , version 1 (22-05-2009)

Identifiers

  • HAL Id : lirmm-00387057 , version 1

Cite

Nadia El Mrabet. What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?. ISA'09: The 3rd International Conference on Information and Assurance, Jun 2009, Séoul, South Korea. pp.122-134. ⟨lirmm-00387057⟩
84 View
342 Download

Share

Gmail Mastodon Facebook X LinkedIn More