Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem

KiSeok Bae, S. Moon, JaeCheol Ha
{"title":"Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem","authors":"KiSeok Bae, S. Moon, JaeCheol Ha","doi":"10.1109/IMIS.2013.36","DOIUrl":null,"url":null,"abstract":"Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptosystem) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the \\emph{if} instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2013.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptosystem) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the \emph{if} instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.
基于配对的密码系统中Miller算法的指令错误攻击
针对基于配对的密码系统,提出了一些错误攻击,如计数器攻击和数据损坏攻击。然而,在基于对的密码学中,文献中并没有出现一种可以跳过传统方案如RSA和ECC(椭圆曲线密码系统)中的if指令的故障模型。本文研究了米勒算法在最后一次迭代中跳过\emph{if}指令的漏洞,并描述了如何提取秘密信息。实际上,所提出的攻击方法比先前针对米勒算法的反错误攻击更有效。作为证据,描述了在仿射和雅可比坐标系中使用一个错误输出找到秘密信息的错误攻击。通过实际的激光故障注入实验,验证了该故障模型的可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信