Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2018-01, Vol.2018 (2018), p.1-14
Hauptverfasser: Zhu, Liehuang, Xu, Rixin, Shang, Ning, Niu, Yongchuan, Wang, An, Zhang, Qi, Zhang, Guoshuang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 14
container_issue 2018
container_start_page 1
container_title Security and communication networks
container_volume 2018
creator Zhu, Liehuang
Xu, Rixin
Shang, Ning
Niu, Yongchuan
Wang, An
Zhang, Qi
Zhang, Guoshuang
description Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical system, Internet of Things, and so on. In this paper, the implementation of SM9 algorithm and its Simple Power Attack (SPA) are discussed. Then, we present template attack and fault attack on SPA-resistant SM9. Our experiments have proved that if attackers try the template attack on an 8-bit microcontrol unit, the secret key can be revealed by enabling the device to execute one time. Fault attack even allows the attackers to obtain the 256-bit key of SM9 by performing the algorithm twice and analyzing the two different results. Accordingly, some countermeasures to resist the three kinds of attacks above are given.
doi_str_mv 10.1155/2018/9701756
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786247</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786247</sourcerecordid><originalsourceid>FETCH-LOGICAL-c317t-ee08dab16bcdff067536c801e4aced3f76e75d5d9f18142b159ea83faa612abc3</originalsourceid><addsrcrecordid>eNqF0E1Lw0AQBuAgCtbqzbMEPGrszmY_kmMNfhQqHqp4DJvsbJPaJnV3g_Tfm5KiR08zMA_vwBsEl0DuADifUALJJJUEJBdHwQjSOI0IUHr8uwM7Dc6cWxEigEk2Cj4WtcYoq1TT4Dqceq_KTxeqRodZ2zUe7QaV6yy60LQ2nGlsfO130b1y2BO72_p2adW2qstwul62tvbVJly8pOfBiVFrhxeHOQ7eHx_esudo_vo0y6bzqIxB-giRJFoVIIpSG0OE5LEoEwLIVIk6NlKg5Jrr1EACjBbAU1RJbJQSQFVRxuPgesjd2varQ-fzVdvZpn-ZU8a5TARlsle3gypt65xFk29tvVF2lwPJ99Xl--ryQ3U9vxl4VTdafdf_6atBY2_QqD9NgfX3-AeaIHhU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786247</pqid></control><display><type>article</type><title>Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9</title><source>Wiley Online Library Open Access</source><source>Alma/SFX Local Collection</source><source>EZB Electronic Journals Library</source><creator>Zhu, Liehuang ; Xu, Rixin ; Shang, Ning ; Niu, Yongchuan ; Wang, An ; Zhang, Qi ; Zhang, Guoshuang</creator><contributor>Anees, Amir</contributor><creatorcontrib>Zhu, Liehuang ; Xu, Rixin ; Shang, Ning ; Niu, Yongchuan ; Wang, An ; Zhang, Qi ; Zhang, Guoshuang ; Anees, Amir</creatorcontrib><description>Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical system, Internet of Things, and so on. In this paper, the implementation of SM9 algorithm and its Simple Power Attack (SPA) are discussed. Then, we present template attack and fault attack on SPA-resistant SM9. Our experiments have proved that if attackers try the template attack on an 8-bit microcontrol unit, the secret key can be revealed by enabling the device to execute one time. Fault attack even allows the attackers to obtain the 256-bit key of SM9 by performing the algorithm twice and analyzing the two different results. Accordingly, some countermeasures to resist the three kinds of attacks above are given.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2018/9701756</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Cloud computing ; Cryptography ; Cyber-physical systems ; Digital signatures ; Internet of Things ; Mobile commerce ; Security systems</subject><ispartof>Security and communication networks, 2018-01, Vol.2018 (2018), p.1-14</ispartof><rights>Copyright © 2018 Qi Zhang et al.</rights><rights>Copyright © 2018 Qi Zhang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c317t-ee08dab16bcdff067536c801e4aced3f76e75d5d9f18142b159ea83faa612abc3</cites><orcidid>0000-0002-1077-9463 ; 0000-0001-8806-0902 ; 0000-0002-2510-4856 ; 0000-0002-6521-5534 ; 0000-0002-0611-2957 ; 0000-0003-3277-3887 ; 0000-0002-5533-3430</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Anees, Amir</contributor><creatorcontrib>Zhu, Liehuang</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Shang, Ning</creatorcontrib><creatorcontrib>Niu, Yongchuan</creatorcontrib><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Zhang, Qi</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><title>Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9</title><title>Security and communication networks</title><description>Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical system, Internet of Things, and so on. In this paper, the implementation of SM9 algorithm and its Simple Power Attack (SPA) are discussed. Then, we present template attack and fault attack on SPA-resistant SM9. Our experiments have proved that if attackers try the template attack on an 8-bit microcontrol unit, the secret key can be revealed by enabling the device to execute one time. Fault attack even allows the attackers to obtain the 256-bit key of SM9 by performing the algorithm twice and analyzing the two different results. Accordingly, some countermeasures to resist the three kinds of attacks above are given.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Cyber-physical systems</subject><subject>Digital signatures</subject><subject>Internet of Things</subject><subject>Mobile commerce</subject><subject>Security systems</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0E1Lw0AQBuAgCtbqzbMEPGrszmY_kmMNfhQqHqp4DJvsbJPaJnV3g_Tfm5KiR08zMA_vwBsEl0DuADifUALJJJUEJBdHwQjSOI0IUHr8uwM7Dc6cWxEigEk2Cj4WtcYoq1TT4Dqceq_KTxeqRodZ2zUe7QaV6yy60LQ2nGlsfO130b1y2BO72_p2adW2qstwul62tvbVJly8pOfBiVFrhxeHOQ7eHx_esudo_vo0y6bzqIxB-giRJFoVIIpSG0OE5LEoEwLIVIk6NlKg5Jrr1EACjBbAU1RJbJQSQFVRxuPgesjd2varQ-fzVdvZpn-ZU8a5TARlsle3gypt65xFk29tvVF2lwPJ99Xl--ryQ3U9vxl4VTdafdf_6atBY2_QqD9NgfX3-AeaIHhU</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Zhu, Liehuang</creator><creator>Xu, Rixin</creator><creator>Shang, Ning</creator><creator>Niu, Yongchuan</creator><creator>Wang, An</creator><creator>Zhang, Qi</creator><creator>Zhang, Guoshuang</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-1077-9463</orcidid><orcidid>https://orcid.org/0000-0001-8806-0902</orcidid><orcidid>https://orcid.org/0000-0002-2510-4856</orcidid><orcidid>https://orcid.org/0000-0002-6521-5534</orcidid><orcidid>https://orcid.org/0000-0002-0611-2957</orcidid><orcidid>https://orcid.org/0000-0003-3277-3887</orcidid><orcidid>https://orcid.org/0000-0002-5533-3430</orcidid></search><sort><creationdate>20180101</creationdate><title>Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9</title><author>Zhu, Liehuang ; Xu, Rixin ; Shang, Ning ; Niu, Yongchuan ; Wang, An ; Zhang, Qi ; Zhang, Guoshuang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c317t-ee08dab16bcdff067536c801e4aced3f76e75d5d9f18142b159ea83faa612abc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Cyber-physical systems</topic><topic>Digital signatures</topic><topic>Internet of Things</topic><topic>Mobile commerce</topic><topic>Security systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhu, Liehuang</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Shang, Ning</creatorcontrib><creatorcontrib>Niu, Yongchuan</creatorcontrib><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Zhang, Qi</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhu, Liehuang</au><au>Xu, Rixin</au><au>Shang, Ning</au><au>Niu, Yongchuan</au><au>Wang, An</au><au>Zhang, Qi</au><au>Zhang, Guoshuang</au><au>Anees, Amir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9</atitle><jtitle>Security and communication networks</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2018</volume><issue>2018</issue><spage>1</spage><epage>14</epage><pages>1-14</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical system, Internet of Things, and so on. In this paper, the implementation of SM9 algorithm and its Simple Power Attack (SPA) are discussed. Then, we present template attack and fault attack on SPA-resistant SM9. Our experiments have proved that if attackers try the template attack on an 8-bit microcontrol unit, the secret key can be revealed by enabling the device to execute one time. Fault attack even allows the attackers to obtain the 256-bit key of SM9 by performing the algorithm twice and analyzing the two different results. Accordingly, some countermeasures to resist the three kinds of attacks above are given.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2018/9701756</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-1077-9463</orcidid><orcidid>https://orcid.org/0000-0001-8806-0902</orcidid><orcidid>https://orcid.org/0000-0002-2510-4856</orcidid><orcidid>https://orcid.org/0000-0002-6521-5534</orcidid><orcidid>https://orcid.org/0000-0002-0611-2957</orcidid><orcidid>https://orcid.org/0000-0003-3277-3887</orcidid><orcidid>https://orcid.org/0000-0002-5533-3430</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2018-01, Vol.2018 (2018), p.1-14
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455786247
source Wiley Online Library Open Access; Alma/SFX Local Collection; EZB Electronic Journals Library
subjects Algorithms
Cloud computing
Cryptography
Cyber-physical systems
Digital signatures
Internet of Things
Mobile commerce
Security systems
title Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T14%3A33%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Side-Channel%20Attacks%20and%20Countermeasures%20for%20Identity-Based%20Cryptographic%20Algorithm%20SM9&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhu,%20Liehuang&rft.date=2018-01-01&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=14&rft.pages=1-14&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2018/9701756&rft_dat=%3Cproquest_cross%3E2455786247%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455786247&rft_id=info:pmid/&rfr_iscdi=true