LPN-based Attacks in the White-box Setting

被引:0
作者
Charlès A. [1 ]
Udovenko A. [1 ]
机构
[1] University of Luxembourg, Esch-sur-Alzette
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2023年 / 2023卷 / 04期
关键词
Cryptanalysis; DCA; Dummy Shuffling; LDA; LPN; Masking; White-box Cryptography;
D O I
10.46586/tches.v2023.i4.318-343
中图分类号
学科分类号
摘要
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks. A standard side-channel countermeasure, Ishai-SahaiWagner’s masking scheme (ISW, CRYPTO 2003) prevents Differential Computation Analysis but was shown to be vulnerable in the white-box context to the Linear Decoding Analysis attack (LDA). However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity. In this work, we study the relationship between the security of these and related schemes to the Learning Parity with Noise (LPN) problem and propose a new automated attack by applying an LPN-solving algorithm to white-box implementations. The attack effectively exploits strong linear approximations of the masking scheme and thus can be seen as a combination of the DCA and LDA techniques. Different from previous attacks, the complexity of this algorithm depends on the approximation error, henceforth allowing new practical attacks on masking schemes which previously resisted automated analysis. We demonstrate it theoretically and experimentally, exposing multiple cases where the LPN-based method significantly outperforms LDA and DCA methods, including their higher-order variants. This work applies the LPN problem beyond its usual post-quantum cryptography boundary, strengthening its interest for the cryptographic community, while expanding the range of automated attacks by presenting a new direction for breaking masking schemes in the white-box model. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:318 / 343
页数:25
相关论文
共 30 条
[1]  
Bock Estuardo Alpirez, Brzuska Chris, Michiels Wil, Treff Alexander, On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography, ACNS 18, volume 10892 of LNCS, pp. 103-120, (2018)
[2]  
Advanced Encryption Standard (AES), (2001)
[3]  
Barbu Guillaume, Beullens Ward, Dottax Emmanuelle, Giraud Christophe, Houzelot Agathe, Li Chaoyun, Mahzoun Mohammad, Ranea Adrian, Xie Jianrui, ECDSA white-box implementations: Attacks and designs from CHES 2021 challenge, IACR TCHES, 2022, 4, pp. 527-552, (2022)
[4]  
Bauer Sven, Drexler Hermann, Gebhardt Max, Klein Dominik, Laus Friederike, Mittmann Johannes, Attacks against white-box ECDSA and discussion of countermeasures: A report on the WhibOx contest 2021, IACR TCHES, 2022, 4, pp. 25-55, (2022)
[5]  
Billet Olivier, Gilbert Henri, Ech-Chatbi Charaf, Cryptanalysis of a white box AES implementation, SAC 2004, volume 3357 of LNCS, pp. 227-240, (2004)
[6]  
Bos Joppe W., Hubain Charles, Michiels Wil, Teuwen Philippe, Differential computation analysis: Hiding your white-box designs is not enough, CHES 2016, volume 9813 of LNCS, pp. 215-236, (2016)
[7]  
Bogdanov Andrey, Rivain Matthieu, Vejre Philip S., Wang Junwei, Higherorder DCA against standard side-channel countermeasures, COSADE 2019, volume 11421 of LNCS, pp. 118-141, (2019)
[8]  
Biryukov Alex, Udovenko Aleksei, Attacks and countermeasures for white-box designs, ASIACRYPT 2018, Part II, volume 11273 of LNCS, pp. 373-402, (2018)
[9]  
Biryukov Alex, Udovenko Aleksei, Dummy shuffling against algebraic attacks in white-box implementations, EUROCRYPT 2021, Part II, volume 12697 of LNCS, pp. 219-248, (2021)
[10]  
Chow Stanley, Eisen Philip A., Johnson Harold, van Oorschot Paul C., White-box cryptography and an AES implementation, SAC 2002, volume 2595 of LNCS, pp. 250-270, (2003)