Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography

Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper...

Full description

Saved in:
Bibliographic Details
Published inCodes, Cryptology, and Information Security pp. 259 - 273
Main Authors El Mrabet, Nadia, Fouotsa, Emmanuel
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2015
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783319186801
3319186809
ISSN0302-9743
1611-3349
1611-3349
DOI10.1007/978-3-319-18681-8_21

Cover

More Information
Summary:Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography against side channel attacks. In particular,we show that this countermeasure does not protect Miller’s algorithm for pairing computation against fault attack. We then give recommendation for a secure implementation of a pairing based protocol using the Miller algorithm.
Bibliography:This work was supported in part by the French ANR-12-INSE-0014 SIMPATIC Project. The second author is supported by The Simons Foundations through Pole of Research in Mathematics with applications to Information Security, Subsaharan Africa.
ISBN:9783319186801
3319186809
ISSN:0302-9743
1611-3349
1611-3349
DOI:10.1007/978-3-319-18681-8_21