Revisiting Higher-order Computational Attacks against White-box Implementations

被引:0
|
作者
Maghrebi, Houssem [1 ]
Alessio, Davide [1 ]
机构
[1] UL Ident Management & Secur, Paris, France
关键词
White-box Cryptography; Masking; Higher-order Computational Attacks; Leakage Detection; AES;
D O I
10.5220/0008874602650272
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in an untrusted environment. Ever since, Chow et al.'s design has been subject to the well-known Differential Computation Analysis (DCA). To resist DCA, a natural approach that white-box designers investigated is to apply the common side-channel countermeasures such as masking. In this paper, we suggest applying the well-studied leakage detection methods to assess the security of masked white-box implementations. Then, we extend some well-known side-channel attacks (i.e. the bucketing computation analysis, the mutual information analysis, and the collision attack) to the higher-order case to defeat higher-order masked white-box implementations. To illustrate the effectiveness of these attacks, we perform a practical evaluation against a first-order masked white-box implementation. The obtained results have demonstrated the practicability of these attacks in a real-world scenario.
引用
收藏
页码:265 / 272
页数:8
相关论文
共 50 条
  • [21] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Xu, Tao
    Wu, Chuankun
    Liu, Feng
    Zhao, Ruoxin
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [22] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao Xu
    Chuankun Wu
    Feng Liu
    Ruoxin Zhao
    Science China Information Sciences, 2018, 61
  • [23] A DFA Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 591 - 617
  • [24] LPN-based Attacks in the White-box Setting
    Charlès A.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 318 - 343
  • [25] NOVEL ADVERSARIAL DEFENSE TECHNIQUES FOR WHITE-BOX ATTACKS
    Van Tuinen, Jason
    Ranganath, Aditya
    Konjevod, Goran
    Singhal, Mukesh
    Marcia, Roummel
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 617 - 622
  • [26] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao XU
    Chuankun WU
    Feng LIU
    Ruoxin ZHAO
    Science China(Information Sciences), 2018, 61 (03) : 237 - 239
  • [27] Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
    Gierlichs, Benedikt
    Batina, Lejla
    Preneel, Bart
    Verbauwhede, Ingrid
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 221 - 234
  • [28] White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
    Erba, Alessandro
    Tippenhauer, Nils Ole
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 111 - 131
  • [29] Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021
    Bauer, Sven
    Drexler, Hermann
    Gebhardt, Max
    Klein, Dominik
    Laus, Friederike
    Mittmann, Johannes
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 25 - 55
  • [30] Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
    Di Crescenzo, Giovanni
    Bahler, Lisa
    McIntosh, Allen
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,