{"title":"Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem","authors":"KiSeok Bae, S. Moon, JaeCheol Ha","doi":"10.1109/IMIS.2013.36","DOIUrl":null,"url":null,"abstract":"Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptosystem) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the \\emph{if} instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2013.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptosystem) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the \emph{if} instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.