HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?

Nadia El Mrabet 1
1 ARITH - Arithmétique informatique
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : We complete the study of [16] and [20] about the Miller's algorithm. The Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.
Document type :
Conference papers
Complete list of metadata

Cited literature [19 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00387057
Contributor : Nadia El Mrabet Connect in order to contact the contributor
Submitted on : Friday, May 22, 2009 - 7:18:35 PM
Last modification on : Tuesday, March 15, 2022 - 12:55:39 PM
Long-term archiving on: : Thursday, June 10, 2010 - 11:44:08 PM

File

ISA09.pdf
Publisher files allowed on an open archive

Identifiers

  • HAL Id : lirmm-00387057, version 1

Citation

Nadia El Mrabet. What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?. ISA'09: The 3rd International Conference on Information and Assurance, Jun 2009, Séoul, South Korea. pp.122-134. ⟨lirmm-00387057⟩

Share

Metrics

Record views

75

Files downloads

284