Paper
8 December 2022 Security analysis of SM2 signature algorithm based on fault attack
Chuisheng Qian, Yan Wang, MingHua Wang, ZiQi Zhao
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 1247402 (2022) https://doi.org/10.1117/12.2653740
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chuisheng Qian, Yan Wang, MingHua Wang, and ZiQi Zhao "Security analysis of SM2 signature algorithm based on fault attack", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 1247402 (8 December 2022); https://doi.org/10.1117/12.2653740
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Cryptography

Electrical engineering

Computer security

Algorithm development

CRTs

Defense and security

Operating systems

RELATED CONTENT

Strategy for tactical cellular connectivity
Proceedings of SPIE (May 23 2011)
Quantum unicity distance
Proceedings of SPIE (May 04 2012)
Is there a future in privacy encryption and digital...
Proceedings of SPIE (March 12 1996)

Back to Top