王立辉, 赵兵, 李清, 梁晓兵, 刘静. 一种针对SM2规整点乘算法的新型SPA攻击[J]. 微电子学与计算机, 2018, 35(8): 26-30.
引用本文: 王立辉, 赵兵, 李清, 梁晓兵, 刘静. 一种针对SM2规整点乘算法的新型SPA攻击[J]. 微电子学与计算机, 2018, 35(8): 26-30.
WANG Li-hui, ZHAO Bing, Li Qing, LIANG Xiao-bing, LIU Jing. A Novel SPA Attack on SM2 with Regular Point Multiplication[J]. Microelectronics & Computer, 2018, 35(8): 26-30.
Citation: WANG Li-hui, ZHAO Bing, Li Qing, LIANG Xiao-bing, LIU Jing. A Novel SPA Attack on SM2 with Regular Point Multiplication[J]. Microelectronics & Computer, 2018, 35(8): 26-30.

一种针对SM2规整点乘算法的新型SPA攻击

A Novel SPA Attack on SM2 with Regular Point Multiplication

  • 摘要: 相比于RSA密码算法, SM2在同样的安全强度下需要更短的密钥长度, 因此更适合于应用到资源受限的智能卡中.为了SM2应用的安全性, 人们研究出多种具有抗侧道攻击能力的SM2点乘算法.本文提出了一种基于条件减法的新型简单功耗分析方法, 可以对常用的两种防护实现进行密钥的破解.实验结果表明, 该方法只需要一条功耗曲线, 即可在几秒钟内破解出SM2密钥.同时本文也给出了几种可以抵御该攻击的防护方法.

     

    Abstract: Compared with the RSA, the shorter key length is needed in the same security strength, so SM2 is more suitable for the application to the resource limited smart card. For the security of application of SM2, people study the variety point multiplication algorithms with countermeasures to resist the side channel attacks. This paper proposes a new simple side-channel analysis (SPA) method based conditional subtraction to attack two usual SM2 algorithms with countermeasures. Experimental results show that this method only needs a power trace, which can be used to break the SM2 key in a few seconds. At the same time, this paper also demonstrates some countermeasures to resist the attack.

     

/

返回文章
返回