An Efficient Masked White-Box Implementation of SM4

被引:1
作者
Zhao, Dongyan [1 ]
Wang, Yubo [1 ]
Li, Yan [1 ]
Hu, Xiaobo [1 ]
Yu, Yanyan [1 ]
Chen, Shi [2 ]
Zheng, Shihui [2 ]
机构
[1] Beijing Smart Chip Microelect Technol Co Ltd, Beijing 102299, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Dept Cyberspace Secur, Beijing 100876, Peoples R China
关键词
SM4; white-box; Boolean mask; differential computation attack (DCA); IMPROVEMENT;
D O I
10.3390/electronics13122326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential computation analysis (DCA) is a powerful method for extracting secret information from carefully designed white-box schemes without reverse engineering. Consequently, white-box solutions typically require substantial storage and computing resources to withstand DCAs, as demonstrated by the schemes proposed by Zhang et al. and Yuan et al. for the ISO/IEC standard algorithm SM4. Our approach employs Boolean masking to obscure the correlation between the key and intermediate states. Additionally, we introduce nonlinear permutations to reuse random mask values, thereby reducing space consumption. Experimental results indicate that DCAs against both the simplified version and the algebraic enhancement version of our scheme fail to retrieve the correct keys. Moreover, the former version can be implemented with approximately 1.62 MB of memory and the latter with 7.8 MB, which is much less than 24.3 MB (Zhang et al.) and 34.5 MB (Yuan et al.). Consequently, our design can thwart first-order DCA with lower overhead.
引用
收藏
页数:18
相关论文
共 32 条
[21]   Black- and white-box approaches for cascaded tanks benchmark system identification [J].
Giordano, G. ;
Sjoberg, J. .
MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2018, 108 :387-397
[22]   Cryptanalysis of a white box AES implementation [J].
Billet, O ;
Gilbert, H ;
Ech-Chatbi, C .
SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 :227-240
[23]   Bayesian Proxy Modelling for Estimating Black Carbon Concentrations using White-Box and Black-Box Models [J].
Zaidan, Martha A. ;
Wraith, Darren ;
Boor, Brandon E. ;
Hussein, Tareq .
APPLIED SCIENCES-BASEL, 2019, 9 (22)
[24]   Black-Box vs. White-Box: Understanding Their Advantages and Weaknesses From a Practical Point of View [J].
Loyola-Gonzalez, Octavio .
IEEE ACCESS, 2019, 7 :154096-154113
[25]   WBDL:改进的SM4动态白盒密码算法 [J].
杨亚涛 ;
董辉 ;
张也 ;
张艳硕 .
密码学报, 2023, 10 (04) :796-812
[26]   White-box methodologies for achieving robust correlations in hydrogen storage with metal-organic frameworks [J].
Naghizadeh, Arefeh ;
Hadavimoghaddam, Fahimeh ;
Atashrouz, Saeid ;
Abedi, Ali ;
Essakhraoui, Meriem ;
Mohaddespour, Ahmad ;
Hemmati-Sarapardeh, Abdolhossein .
SCIENTIFIC REPORTS, 2025, 15 (01)
[27]   Fault Attacks on a Cloud-Assisted ECDSA White-Box Based on the Residue Number System [J].
Giraud, Christophe ;
Houzelot, Agathe .
2023 WORKSHOP ON FAULT DETECTION AND TOLERANCE IN CRYPTOGRAPHY, FDTC 2023, 2023, :72-80
[28]   The Right Direction Needed to Develop White-Box Deep Learning in Radiology, Pathology, and Ophthalmology: A Short Review [J].
Hayashi, Yoichi .
FRONTIERS IN ROBOTICS AND AI, 2019, 6
[29]   Development of a bottom-up white-box building stock energy model for single-family dwellings [J].
Neale, Adam ;
Kummert, Michael ;
Bernier, Michel .
JOURNAL OF BUILDING PERFORMANCE SIMULATION, 2022, 15 (06) :735-756
[30]   A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control [J].
Leite, Cristoffer ;
den Hartog, Jerry ;
Koster, Paul .
PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, :7-18