Comments on the SM2 key exchange protocol

9Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

SM2 key exchange protocol is one part of the public key cryptographic algorithm SM2 which has been standardized by Chinese state cryptography administration for commercial applications. It became publicly available in 2010 and since then it was neither attacked nor proved to be secure. In this paper, we show that the SM2 key exchange protocol is insecure by presenting realistic attacks in the Canetti-Krawczyk model. The demonstrated attack breaks session-key security against an adversary who can only reveal session states. We also propose a simple modification method to solve this problem. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Xu, J., & Feng, D. (2011). Comments on the SM2 key exchange protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7092 LNCS, pp. 160–171). https://doi.org/10.1007/978-3-642-25513-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free