Netinfo Security ›› 2024, Vol. 24 ›› Issue (6): 831-842.doi: 10.3969/j.issn.1671-1122.2024.06.002

Previous Articles     Next Articles

Subversion Attacks and Countermeasures of SM9 Encryption

OUYANG Mengdi, SUN Qinshuo, LI Fagen()   

  1. Computer Science and Engineering College, University of Electronic Science and Technology of China, Chengdu 611731, China
  • Received:2024-04-20 Online:2024-06-10 Published:2024-07-05

Abstract:

China’s independently developed identity-based encryption algorithm SM9 has been successfully selected as an ISO/IEC international standard. However, adversary can tamper components of cryptographic algorithms to undermine their security. During the initial design of SM9 encryption algorithm, such subversion attacks were not considered. Whether SM9 encryption algorithm is vulnerable to subversion attacks and how to resist subversion attacks is still an unknown issue. To answer the above question, this paper introduced a subversion attack model for identity-based encryption(IBE) and defined two properties: plaintext recoverability and undetectability. In addition, this paper implemented a subversion attack on SM9 encryption algorithm and found that an adversary could recover a plaintext with only two successive ciphertexts. Moreover, this paper proposed a subversion-resilient SM9 encryption(SR-SM9), and proved SR-SM9 was not only secure under the adaptive chosen identity and ciphertext attack(ID-IND-CCA2) but also was subversion-resilient. Finally, this paper implemented SR-SM9 based on gmalg library and Python language. Compared with SM9, SR-SM9 only adds 0.6% computation cost with no additional communication cost.

Key words: SM9 encryption, identity-based cryptography, subversion attack, subversion- resilient

CLC Number: