A dynamic study with side channel against an identification based encryption

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Recently, the side channel keeps the attention of researchers in theory of pairing, since, several studies have been done in this subject and all they have the aim in order to attack the cryptosystems of Identification Based Encryption (IBE) which are integrated into Smart Cards (more than 80% of those cryptosystems are based on a pairing). The great success and the remarkable development of the cryptography IBE in the recent years and the direct connection of this success to the ability of resistance against any kind of attack, especially the DPA (Differential Power Analysis) and DFA (Differential Fault Analysis) attacks, leave us to browse saying all the studies of the DPA and DFA attacks applied to a pairing and we have observed that they have no great effect to attack the cryptosystems of IBE. That is what we will see in this paper. In this work we will illuminate the effect of the DPA attack on a cryptosystems of IBE and we would see on what level we can arrive. Thus in the case where this attack can influence on those cryptosystems, we can present an appropriate counter-measures to resist such attack. In the other part, we will also propose a convenient counter-measure to defend against the DFA attack when the embedding degree is even.

References Powered by Scopus

Differential power analysis

6016Citations
N/AReaders
Get full text

Use of Elliptic Curves in Cryptography

2969Citations
N/AReaders
Get full text

Efficient Identity-Based Encryption without random oracles

1722Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Aouinatou, R., Belkasmi, M., & Askali, M. (2015). A dynamic study with side channel against an identification based encryption. International Journal of Communication Networks and Information Security, 7(1), 8–19. https://doi.org/10.17762/ijcnis.v7i1.860

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

100%

Readers' Discipline

Tooltip

Computer Science 3

60%

Design 1

20%

Engineering 1

20%

Save time finding and organizing research with Mendeley

Sign up for free