You are looking at a specific version 20180706:131645 of this paper. See the latest version.

Paper 2018/651

Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study

Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida García and Billy Brumley

Abstract

SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption. Ahead of schedule, code for this functionality was recently mainlined in OpenSSL, marked for the upcoming 1.1.1 release. We perform a security review of this implementation, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks. To assess the latter, we carry out a side-channel security evaluation and discover that the implementation hits every pitfall seen for OpenSSL's ECDSA code in the past decade. We carry out remote timings, cache timings, and EM analysis, with accompanying empirical data to demonstrate secret information leakage during execution of both digital signature generation and public key decryption. Finally, we propose, implement, and empirically evaluate countermeasures.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
applied cryptographypublic-key cryptographyside-channel analysistiming attackscache-timing attackspower analysisTVLASM2OpenSSLapplied cryptographycryptanalysis
Contact author(s)
nicola tuveri @ tut fi
History
2018-12-21: revised
2018-07-06: received
See all versions
Short URL
https://ia.cr/2018/651
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.