How to reveal the secrets of an obscure white-box implementation

被引:7
作者
Goubin, Louis [1 ]
Paillier, Pascal [2 ]
Rivain, Matthieu [2 ]
Wang, Junwei [2 ,3 ,4 ]
机构
[1] Univ Paris Saclay, Lab Math Versailles, UVSQ, CNRS, F-78035 Versailles, France
[2] CryptoExperts, 41 Blvd Capucines, F-75002 Paris, France
[3] Univ Luxembourg, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
[4] Univ Paris 08, 2 Rue Liberte, F-93526 St Denis, France
基金
欧盟地平线“2020”;
关键词
White-box cryptography; WhibOX contest; Linear decoding analysis; Reverse engineering; SECURITY NOTIONS; CRYPTANALYSIS; AES;
D O I
10.1007/s13389-019-00207-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge.
引用
收藏
页码:49 / 66
页数:18
相关论文
共 35 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 2012, Matrix computations
[3]  
[Anonymous], UNBOXING WHITE BOX P
[4]  
[Anonymous], 2013450 CRYPT EPRINT
[5]  
[Anonymous], AES THE ADV ENCRYPTI
[6]  
[Anonymous], 885911998 ISOIEC
[7]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[8]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[9]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[10]  
Biryukov A, 2018, LECT NOTES COMPUT SC, V11273, P373, DOI 10.1007/978-3-030-03329-3_13