What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?

  • Authors:
  • Nadia Mrabet

  • Affiliations:
  • LIRMM Laboratory, I3M, CNRS, University Montpellier, Montpellier, France 34 392

  • Venue:
  • ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We complete the study of [16] and [20] about the Miller's algorithm. The Miller's algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution of a nonlinear system. We show that the final exponentiation is no longer a counter measure to this attack for the Tate and Ate pairings.