Partially known information attack on SM2 key exchange protocol

被引:0
|
作者
Wei Wei
Jiazhe Chen
Dan Li
Beibei Wang
机构
[1] China Information Technology Security Evaluation Center,Institute for Advanced Study
[2] Tsinghua University,undefined
来源
关键词
SM2 key exchange protocol; cryptanalysis; information leakage; lattice attack; extended hidden number problem;
D O I
暂无
中图分类号
学科分类号
摘要
SM2 key exchange protocol is a part of the SM2 public key cryptographic algorithm based on elliptic curves which has been issued by Chinese State Cryptography Administration since 2010. Under the guide of Chinese government, SM2 has been widely used in Chinese commercial applications. This paper gives the first partially known information attack on SM2 key exchange protocol. Our attack is based on a technique modified from the hidden number problem (HNP) which was introduced originally to study the bit security of Diffie-Hellman and related schemes. We present a polynomial-time algorithm which could recover the user’s secret key when given about half least significant bits of the two unknown intermediate values in each congruence over about 30 to 40 instances. Compared with the standard HNP, our approach deals with congruence involved two independent unknown variables and each of them possesses the same size as the secret key. Moreover, our results almost coincide with the previous best result among the same field considering the extreme case in which one variant is completely revealed.
引用
收藏
相关论文
共 50 条
  • [1] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    [J]. Science China(Information Sciences), 2019, 62 (03) : 61 - 74
  • [2] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [3] Comments on the SM2 Key Exchange Protocol
    Xu, Jing
    Feng, Dengguo
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 160 - 171
  • [4] Security analysis of SM2 key exchange protocol in TPM2.0
    Zhao, Shijun
    Xi, Li
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 383 - 395
  • [5] Unbalancing Computations for SM2 Key Exchange Protocols
    Zhao, Chenxi
    Zhang, Jie
    Huang, Xin
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 335 - 341
  • [6] Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
    Yang, Ang
    Nam, Junghyun
    Kim, Moonseong
    Choo, Kim-Kwang Raymond
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
    Liu, Mingjie
    Chen, Jiazhe
    Li, Hexin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
  • [8] Key Reuse Attack on NewHope Key Exchange Protocol
    Liu, Chao
    Zheng, Zhongxiang
    Zou, Guangnan
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
  • [9] Known-Key Attack on SM4 Block Cipher
    Kang, HyungChul
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2985 - 2990
  • [10] Anonymous Credential Protocol Based on SM2 Digital Signature
    Zhao, Yan-Qi
    Yang, Xiao-Yi
    Feng, Qi
    Yu, Yong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3469 - 3481