期刊文献+

基于减轮故障的SM2解密算法选择密文组合攻击 被引量:1

Chosen Ciphertext Combined Attack Based on Round-Reduced Fault Against SM2 Decryption Algorithm
下载PDF
导出
摘要 SM2系列算法是由我国自主设计的商用椭圆曲线密码算法.目前,对SM2解密算法的实现安全性分析通常遵循对椭圆曲线通用组件的研究成果,缺乏结合算法本身结构和特点而进行的实现安全性研究.同时,SM2解密算法中的哈希和验证步骤,使大部分需要利用错误输出的故障攻击方式对于SM2解密算法并不适用.针对该现状,本文根据SM2解密算法本身的特点,结合安全错误类故障攻击思想,提出了一种减轮故障与侧信道相结合的选择密文组合攻击.攻击的核心是通过故障注入改变标量乘循环的轮数,然后由侧信道分析确定故障轮数的具体取值.根据部分密钥猜测结合明文、正确密文等构建选择密文,并将其输入至具有特定故障效果的解密设备,最后通过解密设备输出验证部分密钥猜测是否正确,逐步恢复私钥.此外,文中分析了攻击对不同标量乘法以及常见防护对策的适用性.最后,本文在基于ARM Cortex M4核心的STM32F303微控制器芯片上,使用时钟毛刺注入和简单能量分析的方式对SM2解密算法进行了实际攻击实验并成功恢复出了私钥.实验结果表明,该攻击方法具有可行性和实用性. SM2 algorithm is a commercial elliptic curve cryptographic algorithm designed by China.At present,the analysis of the implementation security of this algorithm usually follows the research results on the common components of elliptic curves rather than the structure and characteristics of the algorithm.At the same time,hash and verification steps in SM2 decryption algorithm make most of the fault attacks that need to exploit the error output not applicable.To solve this problem,according to characteristics of SM2 decryption algorithm,this paper proposes a chosen ciphertext combined attack that combines the round-reduced fault with side channel based on the idea of safe-error.The core of the attack is changing the number of rounds of scalar multiplication by fault injection,and determining the specific number of faulty rounds by side channel analysis.Then it constructs the chosen ciphertext based on partial key guesses combined with plaintext and correct ciphertext.And the chosen ciphertext is input to the decryption device with specific fault effect,verifying whether the partial key guess is correct by the output of the decryption device.Also,the applicability of the attack to different scalar multiplication methods and common protection countermeasures is analyzed in the paper.Lastly,we conduct practical attack experiments on the SM2 decryption algorithm with clock glitch injection and simple power analysis on an STM32F303 microcontroller chip based on the ARM Cortex M4.And we successfully recover the private key.The experimental results show that the attack method is feasible and practical.
作者 李昊远 韩绪仓 曹伟琼 王舰 陈华 LI Hao-yuan;HAN Xu-cang;CAO Wei-qiong;WANG Jian;CHEN Hua(Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2023年第11期3187-3198,共12页 Acta Electronica Sinica
基金 国家自然科学基金(No.62172395)。
关键词 组合攻击 减轮故障 侧信道攻击 选择密文 安全错误 SM2解密 combined attack round-reduced fault side channel attack chosen ciphertext safe-error SM2 decryption
  • 相关文献

参考文献4

二级参考文献15

  • 1KOCHER P, JAFFE J, JUN B. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Proceedings of 16th International Advances in Cryptology Conference-CRYPTO 96[C]. 1996.104-113.
  • 2YENS M, LIEN W C, MOONS J, et al. Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mecha- nism for RSA decryption[A]. MYCRYPT 2005 [C]. 2005. 183-195.
  • 3MIYAMOTO A, HOMMA N, AOKI T, et al. Enhanced power analysis attack using chosen message against RSA hardware implementa- tions[A]. IEEE International Conference on Field Programmable Logic and Applications[C]. 2008.3282-3285.
  • 4HOMMA N, M1YAMOTO A, AOKI T, et al. Comparative power analysis of modular exponentiation algorithms[J]. IEEE Transaction on Computers, 2010.795-807.
  • 5YENSM, LIEN W C, CHEN C N. Modified doubling attack by ex- ploiting chosen ciphertext of small order[A]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sci- ences[C]. 201 1. 1981-1990.
  • 6FAN J, GIERLICHS B, VERCAUTEREN F. To infinity and beyond:' combined attack on ECC using points of low order[A]. International Workshop on Cryptographic Hardware and Embedded Systems[C]. CHES, LNCS, 2011.
  • 7HANKERSON D, MENEZES A, VANSTONE S. Guide to Elliptic Curve Cryptography[M]. New York, USA: Springer-Verlagn, 2003.
  • 8CORON J S. Resistance against differential power analysis for elliptic curve cryptosystems[A]. International Workshop on Cryptographic Hardware and Embedded Systems[C]. CHES, LNCS, 1999.
  • 9CHEN T, LI H, WU K, YU F. Countermeasure of ECC against side-channel attacks: balanced point addition and point doubling op- eration procedure[A]. AsiaPacific Conference on Information Proc- essing 2009[C]. 2009. 465-469.
  • 10LUO P, FENG D G, ZHOU Y B. Power model in power analysis at- tack[J]. Journal on Communications, 2012, 33(Z1):276-282.

共引文献99

同被引文献22

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部