White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode

被引:7
作者
Zhou, Jie [1 ]
Bai, Jian [2 ]
Jiang, Meng Shan [2 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] China Elect Technol Cyber Secur Co Ltd, Chengdu 610041, Peoples R China
关键词
CRYPTANALYSIS; CRYPTOGRAPHY; SECURITY; CIPHER;
D O I
10.1155/2020/8881116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the "cloud plus side" mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments.
引用
收藏
页数:10
相关论文
共 39 条
[1]   A DFA Attack on White-Box Implementations of AES with External Encodings [J].
Amadori, Alessandro ;
Michiels, Wil ;
Roelse, Peter .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 :591-617
[2]  
American National Standards Institute, 1999, PUBL KEY CRYPT FIN S
[3]  
[Anonymous], 2009, REV REMOTE SENSING A, DOI DOI 10.1109/CSA.2009.5404239
[4]  
[Anonymous], 1959, P W JOINT COMP C SAN
[5]   Protect white-box AES to resist table composition attacks [J].
Bai, Kunpeng ;
Wu, Chuankun ;
Zhang, Zhenfeng .
IET INFORMATION SECURITY, 2018, 12 (04) :305-313
[6]   White-Box Cryptography: Security in an Insecure Environment [J].
Beunardeau, Marc ;
Connolly, Aisling ;
Geraud, Remi ;
Naccache, David .
IEEE SECURITY & PRIVACY, 2016, 14 (05) :88-92
[7]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[8]  
Biryukov A, 2014, LECT NOTES COMPUT SC, V8873, P63, DOI 10.1007/978-3-662-45611-8_4
[9]  
Bock E.A., 2020, IACR TCHES, P327
[10]  
Bringer J., 2006, IACR Cryptology ePrint Archive, V2006, P468