Implementation attacks & countermeasures

  • Claire Whelan
  • , Dan Page
  • , Frederik Vercauteren
  • , Michael Scott
  • , William Marnane

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

In this chapter the effect of implementation attacks on the security of pairings is examined. This is a particularly pertinent issue given the increasing efficiency of pairing algorithms, which have recently proved viable for implementation on resource constrained devices where such attacks pose a serious threat. Specifically, we discuss power analysis and fault attacks on a range of pairing algorithms. Countermeasures and their impact on performance are also described.

Original languageEnglish
Title of host publicationIdentity-Based Cryptography
PublisherIOS Press
Pages226-262
Number of pages37
ISBN (Print)9781586039479
DOIs
Publication statusPublished - 2009

Publication series

NameCryptology and Information Security Series
Volume2
ISSN (Print)1871-6431
ISSN (Electronic)1879-8101

Keywords

  • Bilinear maps
  • correlation power analysis
  • differential power analysis
  • fault analysis
  • pairings
  • side channel analysis

Fingerprint

Dive into the research topics of 'Implementation attacks & countermeasures'. Together they form a unique fingerprint.

Cite this