Dummy Shuffling Against Algebraic Attacks in White-Box Implementations

被引:7
作者
Biryukov, Alex [1 ]
Udovenko, Aleksei [2 ]
机构
[1] Univ Luxembourg, DCS & SnT, Luxembourg, Luxembourg
[2] CryptoExperts, Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II | 2021年 / 12697卷
关键词
White-box; Obfuscation; Provable security; Shuffling; Algebraic attack; SOFTWARE IMPLEMENTATIONS; POWER ANALYSIS; CRYPTANALYSIS; HARDWARE;
D O I
10.1007/978-3-030-77886-6_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CHES 2016, Bos et al. showed that most of existing whitebox implementations are easily broken by standard side-channel attacks. A natural idea to apply the well-developed side-channel countermeasure - linear masking schemes - leaves implementations vulnerable to linear algebraic attacks which exploit absence of noise in the white-box setting and are applicable for any order of linear masking. At ASIACRYPT 2018, Biryukov and Udovenko proposed a security model (BU-model for short) for protection against linear algebraic attacks and a new quadratic masking scheme which is provably secure in this model. However, countermeasures against higher-degree attacks were left as an open problem. In this work, we study the effectiveness of another well-known side-channel countermeasure - shuffling - against linear and higher-degree algebraic attacks in the white-box setting. First, we extend the classic shuffling to include dummy computation slots and show that this is a crucial component for protecting against the algebraic attacks. We quantify and prove the security of dummy shuffling against the linear algebraic attack in the BU-model. We introduce a refreshing technique for dummy shuffling and show that it allows to achieve close to optimal protection in the model for arbitrary degrees of the attack, thus solving the open problem of protection against the algebraic attack in the BU-model. Furthermore, we describe an interesting proof-of-concept construction that makes the slot function public (while keeping the shuffling indexes private).
引用
收藏
页码:219 / 248
页数:30
相关论文
共 24 条
[1]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[2]  
Biryukov A, 2018, LECT NOTES COMPUT SC, V11273, P373, DOI 10.1007/978-3-030-03329-3_13
[3]  
Blum A., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P435, DOI 10.1145/335305.335355
[4]  
Bogdanov A., 2019, CHES 2019 CAPTURE FL, V2nd
[5]   Higher-Order DCA against Standard Side-Channel Countermeasures [J].
Bogdanov, Andrey ;
Rivain, Matthieu ;
Vejre, Philip S. ;
Wang, Junwei .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 :118-141
[6]   Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [J].
Bos, Joppe W. ;
Hubain, Charles ;
Michiels, Wil ;
Teuwen, Philippe .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :215-236
[7]  
Breunesse C.B., 2018, 2018095 CRYPT EPRINT
[8]  
Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
[9]  
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[10]  
Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252