Revisiting Higher-order Computational Attacks against White-box Implementations

被引:0
作者
Maghrebi, Houssem [1 ]
Alessio, Davide [1 ]
机构
[1] UL Ident Management & Secur, Paris, France
来源
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2020年
关键词
White-box Cryptography; Masking; Higher-order Computational Attacks; Leakage Detection; AES;
D O I
10.5220/0008874602650272
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in an untrusted environment. Ever since, Chow et al.'s design has been subject to the well-known Differential Computation Analysis (DCA). To resist DCA, a natural approach that white-box designers investigated is to apply the common side-channel countermeasures such as masking. In this paper, we suggest applying the well-studied leakage detection methods to assess the security of masked white-box implementations. Then, we extend some well-known side-channel attacks (i.e. the bucketing computation analysis, the mutual information analysis, and the collision attack) to the higher-order case to defeat higher-order masked white-box implementations. To illustrate the effectiveness of these attacks, we perform a practical evaluation against a first-order masked white-box implementation. The obtained results have demonstrated the practicability of these attacks in a real-world scenario.
引用
收藏
页码:265 / 272
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2019, SUPPORTING MAT
  • [2] Mutual Information Analysis: a Comprehensive Study
    Batina, Lejla
    Gierlichs, Benedikt
    Prouff, Emmanuel
    Rivain, Matthieu
    Standaert, Francois-Xavier
    Veyrat-Charvillon, Nicolas
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (02) : 269 - 291
  • [3] Higher-Order DCA against Standard Side-Channel Countermeasures
    Bogdanov, Andrey
    Rivain, Matthieu
    Vejre, Philip S.
    Wang, Junwei
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 118 - 141
  • [4] Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
    Bos, Joppe W.
    Hubain, Charles
    Michiels, Wil
    Teuwen, Philippe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 215 - 236
  • [5] Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
  • [6] Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
  • [7] Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
  • [8] Gierlichs B, 2010, LECT NOTES COMPUT SC, V5985, P221, DOI 10.1007/978-3-642-11925-5_16
  • [9] Goubin L., 2019, J CRYPTOGRAPHIC ENG
  • [10] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388