Paper 2011/181

Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack

Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury

Abstract

This paper deals with the differential power attack on a pairing cryptoprocessor. The cryptoprocessor is designed for pairing computations on elliptic curves defined over finite fields with large prime characteristic. The work pinpoints the vulnerabilities of such pairing computations against side-channel attacks. By exploiting the power consumptions, the paper experimentally demonstrates such vulnerability on FPGA platform. A suitable counteracting technique is also suggested to overcome such vulnerability.

Metadata
Available format(s)
PDF PS
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Pairing Based CryptographySide-channel AnalysisPower Analysis AttackDPA AttackPrime Fields.
Contact author(s)
santosh ghosh @ gmail com
History
2011-04-08: received
Short URL
https://ia.cr/2011/181
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/181,
      author = {Santosh Ghosh and Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury},
      title = {Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/181},
      year = {2011},
      url = {https://eprint.iacr.org/2011/181}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.