loading page

Lattice-based fault attack and defensive strategies targeting the SM2 Signature Algorithm
  • +1
  • Cuiping Shao,
  • Wenzhe Li,
  • Huiyun Li,
  • Jianing Liang
Cuiping Shao
Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences

Corresponding Author:cp.shao@siat.ac.cn

Author Profile
Wenzhe Li
Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences
Author Profile
Huiyun Li
Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences
Author Profile
Jianing Liang
Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences
Author Profile

Abstract

Fault injection attacks can compromise cryptographic operations with out the necessity of physical alteration, thereby potentially disclosing private keys, which poses a grave threat to the security of elliptic curve digital signature algorithms. This letter presents an efficient and prac tical lattice-based fault injection attack on the SM2 digital signature algorithm (SM2-DSA), along with the corresponding defense strategy. The proposed attack method significantly reduces the moment precision requirements compared to existing lattice-based fault attacks, while also demonstrating computational advantages over other fault attacks. From the defensive perspective, the proposed strategy effectively defend against the lattice-based fault injection attacks while minimizing both time and spatial overheads. Specifically, our countermeasure incurs only a 0.8% time overhead and the area overhead for secure design does not exceed 1%. Our research provides valuable insights for evaluating the security of hardware implementations of SM2-DSA.
26 Aug 2024Submitted to Electronics Letters
29 Aug 2024Submission Checks Completed
29 Aug 2024Assigned to Editor
29 Aug 2024Review(s) Completed, Editorial Evaluation Pending
11 Nov 2024Reviewer(s) Assigned
01 Dec 2024Editorial Decision: Revise Major
20 Dec 20241st Revision Received