Power Analysis Attacks and Countermeasures on ${\eta}_T$ Pairing over Binary Fields

  • Kim, Tae-Hyun (Center for Information Security Technologies (CIST), Korea University) ;
  • Takagi, Tsuyoshi (School of Systems Information Science, Future University-Hakodate) ;
  • Han, Dong-Guk (Information Security Research Division, ETRI) ;
  • Kim, Ho-Won (Information Security Research Division, ETRI) ;
  • Lim, Jong-In (Center for Information Security Technologies (CIST), Korea University)
  • Received : 2007.03.19
  • Published : 2008.02.28

Abstract

Since many efficient algorithms for implementing pairings have been proposed such as ${\eta}_T$ pairing and the Ate pairing, pairings could be used in constraint devices such as smart cards. However, the secure implementation of pairings has not been thoroughly investigated. In this paper, we investigate the security of ${\eta}_T$ pairing over binary fields in the context of side-channel attacks. We propose efficient and secure ${\eta}_T$ pairing algorithms using randomized projective coordinate systems for computing the pairing.

Keywords