Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Algorithm 5

Fault attack on SM9.
Input: SM9 system parameters, message .
Output:  .
Calculate the correct signature value .
Inject fault on and denote as .
Calculate the wrong signature value .
Calculate .
Calculate .
Establish equations of and .
  for   to 255 do
 Compute by .
  end for
  Calculate by and verify and .
  return