Improving side-channel attacks against pairing-based cryptography

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest. Our proposed approach evaluates the parameters of the attack and validates the data processing workflow.We describe weaknesses in the implementation of cryptographic pairings, and we show how information leakage can be fully exploited. Different leakage models, point-of-interest detection methods, and parameter dependencies are compared. In addition, practical results were obtained with a software implementation of twisted Ate pairing on Barreto–Naehrig curves with an ARM Cortex-M3 processor running at 50 MHz. We discuss countermeasures aimed at reducing side-channel leakage and review the available literature.

Cite

CITATION STYLE

APA

Jauvart, D., Fournier, J. J. A., El-Mrabet, N., & Goubin, L. (2017). Improving side-channel attacks against pairing-based cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10158 LNCS, pp. 199–213). Springer Verlag. https://doi.org/10.1007/978-3-319-54876-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free