Comments on the SM2 key exchange protocol

  • Authors:
  • Jing Xu;Dengguo Feng

  • Affiliations:
  • State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China;State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China

  • Venue:
  • CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

SM2 key exchange protocol is one part of the public key cryptographic algorithm SM2 which has been standardized by Chinese state cryptography administration for commercial applications. It became publicly available in 2010 and since then it was neither attacked nor proved to be secure. In this paper, we show that the SM2 key exchange protocol is insecure by presenting realistic attacks in the Canetti-Krawczyk model. The demonstrated attack breaks session-key security against an adversary who can only reveal session states. We also propose a simple modification method to solve this problem.