1. Partially known information attack on SM2 key exchange protocol
- Author
-
Dan Li, Beibei Wang, Jiazhe Chen, and Wei Wei
- Subjects
Theoretical computer science ,General Computer Science ,Computer science ,business.industry ,Cryptography ,law.invention ,Public-key cryptography ,Congruence (geometry) ,law ,Information leakage ,Key (cryptography) ,State (computer science) ,business ,Cryptanalysis ,Key exchange - Abstract
SM2 key exchange protocol is a part of the SM2 public key cryptographic algorithm based on elliptic curves which has been issued by Chinese State Cryptography Administration since 2010. Under the guide of Chinese government, SM2 has been widely used in Chinese commercial applications. This paper gives the first partially known information attack on SM2 key exchange protocol. Our attack is based on a technique modified from the hidden number problem (HNP) which was introduced originally to study the bit security of Diffie-Hellman and related schemes. We present a polynomial-time algorithm which could recover the users secret key when given about half least significant bits of the two unknown intermediate values in each congruence over about 30 to 40 instances. Compared with the standard HNP, our approach deals with congruence involved two independent unknown variables and each of them possesses the same size as the secret key. Moreover, our results almost coincide with the previous best result among the same field considering the extreme case in which one variant is completely revealed.
- Published
- 2019