Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

Tae Hyun Kim, Tsuyoshi Takagi, Dong Guk Han, Ho Won Kim, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

Abstract

Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.

Original languageEnglish
Title of host publicationCryptology and Network Security - 5th International Conference, CANS 2006, Proceedings
Pages168-181
Number of pages14
DOIs
Publication statusPublished - Dec 1 2006
Event5th International Conference on Cryptology and Network Security, CANS 2006 - Suzhou, China
Duration: Dec 8 2006Dec 10 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4301 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Cryptology and Network Security, CANS 2006
CountryChina
CitySuzhou
Period12/8/0612/10/06

Fingerprint

Pairing-based Cryptosystems
Side Channel Attacks
Countermeasures
Pairing
Cryptography
Binary
Side channel attack
Identity-based
Efficient Implementation
Vulnerability
Elliptic Curves
Efficient Algorithms

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Kim, T. H., Takagi, T., Han, D. G., Kim, H. W., & Lim, J. (2006). Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. In Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings (pp. 168-181). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4301 LNCS). https://doi.org/10.1007/11935070-11

Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. / Kim, Tae Hyun; Takagi, Tsuyoshi; Han, Dong Guk; Kim, Ho Won; Lim, Jongin.

Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. 2006. p. 168-181 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4301 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, TH, Takagi, T, Han, DG, Kim, HW & Lim, J 2006, Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. in Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4301 LNCS, pp. 168-181, 5th International Conference on Cryptology and Network Security, CANS 2006, Suzhou, China, 12/8/06. https://doi.org/10.1007/11935070-11
Kim TH, Takagi T, Han DG, Kim HW, Lim J. Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. In Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. 2006. p. 168-181. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11935070-11
Kim, Tae Hyun ; Takagi, Tsuyoshi ; Han, Dong Guk ; Kim, Ho Won ; Lim, Jongin. / Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. 2006. pp. 168-181 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{46237435e22844a3831c25f529777189,
title = "Side channel attacks and countermeasures on pairing based cryptosystems over binary fields",
abstract = "Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.",
author = "Kim, {Tae Hyun} and Tsuyoshi Takagi and Han, {Dong Guk} and Kim, {Ho Won} and Jongin Lim",
year = "2006",
month = "12",
day = "1",
doi = "10.1007/11935070-11",
language = "English",
isbn = "9783540494621",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "168--181",
booktitle = "Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings",

}

TY - GEN

T1 - Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

AU - Kim, Tae Hyun

AU - Takagi, Tsuyoshi

AU - Han, Dong Guk

AU - Kim, Ho Won

AU - Lim, Jongin

PY - 2006/12/1

Y1 - 2006/12/1

N2 - Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.

AB - Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is crucial to provide efficient and secure implementations of the pairings. There have been several works on efficient implementations of the pairings. However, the research for secure implementations of the pairings has not been thoroughly investigated. In this paper, we investigate vulnerability of the pairing used in some pairing based protocols against side channel attacks. We propose an efficient algorithm secure against such side channel attacks of the eta pairing using randomized projective coordinate systems for the pairing computation.

UR - http://www.scopus.com/inward/record.url?scp=84885926059&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84885926059&partnerID=8YFLogxK

U2 - 10.1007/11935070-11

DO - 10.1007/11935070-11

M3 - Conference contribution

AN - SCOPUS:84885926059

SN - 9783540494621

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 168

EP - 181

BT - Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings

ER -