Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
نویسندگان
چکیده
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.
منابع مشابه
Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields
Pairing based cryptosystems have became suitable for use on constrained devices with small resources. Recently, It has shown that side channel attacks are a serious threat for such cryptographic applications. In order to secure the pairing based cryptosystems against the side channel attacks, many countermeasures have been proposed but their cost is proved to be highly expensive. In this paper,...
متن کاملPower Analysis Attacks and Countermeasures on η T Pairing over Binary Fields
ETRI Journal, Volume 30, Number 1, February 2008 Since many efficient algorithms for implementing pairings have been proposed such as ηT pairing and the Ate pairing, pairings could be used in constraint devices such as smart cards. However, the secure implementation of pairings has not been thoroughly investigated. In this paper, we investigate the security of ηT pairing over binary fields in t...
متن کاملA Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems
Public-key cryptosystems are one of the basic building blocks of modern cryptographic systems. Therefore, it is important that they allow to be implemented resistant to several types of side-channel attacks. In this survey paper, we give an overview of the possible vulnerabilities of implementations of public-key cryptosystems that have been submitted to the NESSIE project and we additionally d...
متن کاملKey Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems
It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that result...
متن کاملFault Attack and Countermeasures on Pairing Based Cryptography
Bilinear pairing is a new and increasingly popular way of constructing cryptographic protocols. This has resulted in the development of Identity Based Encryption (IBE) that is ideally used in identity aware devices. The security of such devices using pairing algorithms against side-channel and fault attack has not been studied extensively. This paper examines the security of existing countermea...
متن کامل