Revisiting Higher-order Computational Attacks against White-box Implementations

被引:0
|
作者
Maghrebi, Houssem [1 ]
Alessio, Davide [1 ]
机构
[1] UL Ident Management & Secur, Paris, France
关键词
White-box Cryptography; Masking; Higher-order Computational Attacks; Leakage Detection; AES;
D O I
10.5220/0008874602650272
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in an untrusted environment. Ever since, Chow et al.'s design has been subject to the well-known Differential Computation Analysis (DCA). To resist DCA, a natural approach that white-box designers investigated is to apply the common side-channel countermeasures such as masking. In this paper, we suggest applying the well-studied leakage detection methods to assess the security of masked white-box implementations. Then, we extend some well-known side-channel attacks (i.e. the bucketing computation analysis, the mutual information analysis, and the collision attack) to the higher-order case to defeat higher-order masked white-box implementations. To illustrate the effectiveness of these attacks, we perform a practical evaluation against a first-order masked white-box implementation. The obtained results have demonstrated the practicability of these attacks in a real-world scenario.
引用
收藏
页码:265 / 272
页数:8
相关论文
共 50 条
  • [1] Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures
    Tang Y.
    Gong Z.
    Chen J.
    Xie N.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 369 - 400
  • [2] Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
    Biryukov, Alex
    Udovenko, Aleksei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 219 - 248
  • [3] Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations
    Tang Y.
    Gong Z.
    Li B.
    Zhao L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 493 - 522
  • [4] Analysis and improvement of differential computation attacks against internally-encoded white-box implementations
    Rivain M.
    Wang J.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 225 - 255
  • [5] A white-box masking scheme resisting computational and algebraic attacks
    Seker, Okan
    Eisenbarth, Thomas
    Liśkiewicz, Maciej
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 61 - 105
  • [6] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [7] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    Computers and Security, 2022, 117
  • [8] Ensuring Tight Computational Security Against Higher-Order DPA Attacks
    Khurana, Dakshita
    Gaurav, Aditya
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 96 - 101
  • [9] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    COMPUTERS & SECURITY, 2022, 117
  • [10] Cryptanalysis of a Generic Class of White-Box Implementations
    Michiels, Wil
    Gorissen, Paul
    Hollmann, Henk D. L.
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 414 - 428