首页> 外文会议>International conference on availability, reliability and security >Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices
【24h】

Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices

机译:对双线性配对的实际攻击,以揭示嵌入式设备的秘密

获取原文

摘要

Identity-based encryption constitutes a promising alternative to traditional cryptography that works without symmetric keys or public key infrastructures. Such schemes generally depend on the computation of bilinear pairings. The latest developments in efficient pairing algorithms made identity-based encryption available to embedded devices as well. However, those devices are inherently exposed to side-channel attacks. In this paper, we present a correlation power analysis attack to extract the private key in the popular identity-based encryption scheme by Boneh and Boyen. On an ARM Cortex-M0 we exploit the leakage of a finite field multiplication within the highly practical optimal-Ate pairing defined over the elliptic curves by Barreto and Naehrig. As a secondary contribution, we practically verified the feasibility of our attack on an FPGA, an ASIC, and using power simulations. For future work our research intends to raise awareness of the importance of the randomization countermeasure in pairing computations.
机译:基于身份的加密构成了传统密码术的有希望的替代方法,后者无需对称密钥或公钥基础结构即可工作。这样的方案通常取决于双线性对的计算。高效配对算法的最新发展也使嵌入式设备也可以使用基于身份的加密。但是,这些设备本来就容易受到侧信道攻击。在本文中,我们提出了一种相关功率分析攻击,以利用Boneh和Boyen在流行的基于身份的加密方案中提取私钥。在ARM Cortex-M0上,我们利用Barreto和Naehrig在椭圆曲线上定义的高度实用的优化Ate配对内的有限域乘法泄漏。作为次要贡献,我们实际上验证了针对FPGA,ASIC和电源仿真进行攻击的可行性。对于未来的工作,我们的研究旨在提高人们对配对计算中配对对策重要性的认识。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号