Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

Tae Hyun Kim, Tsuyoshi Takagi, Dong Guk Han, Ho Won Kim, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.

Original languageEnglish
Title of host publicationCryptology and Network Security - 5th International Conference, CANS 2006, Proceedings
Pages168-181
Number of pages14
DOIs
Publication statusPublished - 2006
Event5th International Conference on Cryptology and Network Security, CANS 2006 - Suzhou, China
Duration: 2006 Dec 82006 Dec 10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4301 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Cryptology and Network Security, CANS 2006
CountryChina
CitySuzhou
Period06/12/806/12/10

Keywords

  • Differential power analysis
  • Eta pairing
  • Pairing based cryptosystems
  • Randomized projective coordinate systems
  • Side channel attacks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Side channel attacks and countermeasures on pairing based cryptosystems over binary fields'. Together they form a unique fingerprint.

Cite this