首页> 外文会议>International Conference on Information and Communications Security >Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm
【24h】

Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm

机译:基于实用格子的故障攻击与SM2签名算法对策

获取原文
获取外文期刊封面目录资料

摘要

We present a practical lattice-based fault attack against SM2 signature algorithm in a smart card. This seems to be the first combination of the lattice attack presented in SAC'2013 and fault attack against SM2 in practice. We successfully utilize the laser fault attack to skip the instructions of nonces being written into RAM, so that the nonces in signatures share partial same bits from each other. Next, we build the model of lattice attack and recover the private key. The experimental results show we only need 3 faulty signatures to mount lattice attack successfully in about 32 μs. Moreover, we propose a new countermeasure for SM2 signature algorithm to resist lattice-based fault attack by destroying the condition of lattice attack rather than thwarting fault attack. It is proved the countermeasure can guarantee the ability to resist lattice attack, even if some information of the nonces is leaked.
机译:我们在智能卡中提出了一种针对SM2签名算法的实用格子的故障攻击。这似乎是SAC'2013中呈现的格子攻击的第一个组合,并在实践中对SM2进行故障攻击。我们成功利用了激光故障攻击以跳过非写入RAM的NAN的指令,使得签名中的NONCES共享相同的比特彼此。接下来,我们构建格子攻击的模型并恢复私钥。实验结果表明,我们只需要3个故障的签名,以在大约32μs中成功地安装晶格攻击。此外,我们为SM2签名算法提出了一种新的对策,通过销毁晶格攻击的条件而不是挫败故障攻击来抵抗基于格子的故障攻击。事实证明,对策可以保证抵抗晶格攻击的能力,即使爆破的一些信息泄露。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号