Improvement on a Masked White-Box Cryptographic Implementation

被引:7
|
作者
Lee, Seungkwang [1 ,2 ]
Kim, Myungchul [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Sch Comp, Daejeon 34141, South Korea
[2] ETRI, Cryptog Engn Res Sect, Daejeon 34129, South Korea
关键词
Encoding; Correlation; Software; Encryption; Licenses; White-box cryptography; AES; DCA; collision attack; bucketing attack; countermeasure;
D O I
10.1109/ACCESS.2020.2993651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information, Differential Computation Analysis (DCA) has recovered the secret keys from white-box cryptographic implementations. In order to thwart DCA, a masked white-box implementation was suggested. It was a customized masking technique that randomizes all the values in the lookup tables with different masks. However, the round output was only permuted by byte encodings, not protected by masking. This is the main reason behind the success of DCA variants on the masked white-box implementation. In this paper, we improve the masked white-box cryptography in such a way to protect against DCA variants by obfuscating the round output with random masks. Specifically, we introduce a white-box AES (WB-AES) implementation applying the masking technique to the key-dependent intermediate value and the several outer-round outputs computed by partial bits of the key. Our analysis and experimental results show that the proposed WB-AES can protect against DCA variants including DCA with a 2-byte key guess, collision, and bucketing attacks. This work requires approximately 3.7 times the table size and 0.7 times the number of lookups compared to the previous masked WB-AES.
引用
收藏
页码:90992 / 91004
页数:13
相关论文
共 50 条
  • [21] A new method for white-box implementation of CLEFIA algorithm
    Yao S.
    Chen J.
    Gong Y.
    Xu D.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 150 - 158
  • [22] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270
  • [23] How to reveal the secrets of an obscure white-box implementation
    Goubin, Louis
    Paillier, Pascal
    Rivain, Matthieu
    Wang, Junwei
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 49 - 66
  • [24] How to reveal the secrets of an obscure white-box implementation
    Louis Goubin
    Pascal Paillier
    Matthieu Rivain
    Junwei Wang
    Journal of Cryptographic Engineering, 2020, 10 : 49 - 66
  • [25] A secure white-box SM4 implementation
    Bai, Kunpeng
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 996 - 1006
  • [26] A white-box cryptographic SM2 scheme based on space hardness
    Jiang, Xiong
    Luo, Tianyuan
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1260 - 1264
  • [27] Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations
    Bos, Joppe W.
    Michiels, Wil
    ERCIM NEWS, 2016, (106): : 10 - +
  • [28] White-box testing
    Cole, O
    DR DOBBS JOURNAL, 2000, 25 (03): : 23 - +
  • [29] White-box benchmarking
    Hernández, E
    Hey, T
    EURO-PAR '98 PARALLEL PROCESSING, 1998, 1470 : 220 - 223
  • [30] Improved White-box SM4 Design and Implementation
    Li, Yanjun
    Bi, Xinjie
    Jing, Xiaoyu
    Zou, Zexiao
    Yang, Long
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1256 - 1261