Cryptography Reference
In-Depth Information
Chapter 13
Fault Attacks on Pairing-Based Cryptography
Nadia El Mrabet, Dan Page and Frederik Vercauteren
Abstract Over the last ten years, the use of bilinear maps or “pairings” as building
block primitives within cryptographic schemes has become commonplace. This trend
has been supported by insight into their security properties and methods for efficient
evaluation; the latter aspect has provided results that now allow even embedded
devices to execute pairing-based schemes. However, this raises questions relating to
physical security in the same way as for RSA- and ECC-based schemes. Specifically,
the secure deployment of a pairing-based scheme necessitates the study of related
fault attacks. This chapter attempts to survey the state of the art in this respect; it
aims to describe the main results in this area, and give an overview of potential
countermeasures.
13.1 Introduction
Fault Attacks
The rich suite of physical attack techniques now available represents a clear and
present danger to devices that execute cryptography; various real-world examples
of their threat include recent attacks on the KeeLoq range of RFID devices used for
Search WWH ::




Custom Search