A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers

被引:0
|
作者
Deng, Tongxia [1 ]
Li, Ping [1 ]
Yang, Shunzhi [1 ,4 ]
Zhang, Yupeng [1 ]
Gong, Zheng [1 ]
Duan, Ming [2 ]
Luo, Yiyuan [3 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou, Peoples R China
[2] Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
[3] Huizhou Univ, Sch Comp Sci & Engn, Huizhou, Peoples R China
[4] Shenzhen Polytech, Inst Appl Artificial Intelligence Guangdong HongK, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
White-box block cipher; Side-channel analysis; Noisy rounds; Deep learning; AES; ATTACKS;
D O I
10.1007/978-3-031-41181-6_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It has been proven that side-channel analysis such as differential computation/fault analysis can break white-box implementations without reverse engineering efforts. In 2020, Sun et al. proposed noisy rounds as a countermeasure to mitigate the side-channel attacks on white-box block ciphers. The principle is to desynchronize the computation traces of cryptographic implementations by introducing several redundant round functions. In this paper, we propose a multi-label classification method and three deep-learning models (CNN, RNN, and CRNN) to predict the locations of the obfuscated rounds. The experimental results show that the obfuscation of noisy rounds also could not be identified by the deep-learning model. However, the RNN is more effective than the CNN and CRNN with fewer time costs. Subsequently, we investigate the influence of specific components such as the key, affine masking, and transformation matrix on round obfuscation recognition. The extended experiments demonstrate that without the transformation matrix, the deep learning models can successfully distinguish the noisy rounds.
引用
收藏
页码:419 / 438
页数:20
相关论文
共 50 条
  • [1] Protecting White-Box Block Ciphers with Galois/Counter Mode
    Xie, Nanjiang
    Gong, Zheng
    Tang, Yufeng
    Wang, Lei
    Wen, Yamin
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [2] Protecting White-Box AES with Dual Ciphers
    Karroumi, Mohamed
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 278 - 291
  • [3] Clarifying obfuscation: Improving the security of white-box DES
    Link, HE
    Neumann, WD
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 679 - 684
  • [4] WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction
    Cho, Jihoon
    Choi, Kyu Young
    Dinur, Itai
    Dunkelman, Orr
    Keller, Nathan
    Moon, Dukjae
    Veidberg, Aviya
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 293 - 308
  • [5] Implicit White-Box Implementations: White-Boxing ARX Ciphers
    Ranea, Adrian
    Vandersmissen, Joachim
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 33 - 63
  • [6] Deep Learning for Gravitational-Wave Data Analysis: A Resampling White-Box Approach
    Morales, Manuel D.
    Antelis, Javier M.
    Moreno, Claudia
    Nesterov, Alexander I.
    SENSORS, 2021, 21 (09)
  • [7] White-box Cryptography Revisited: Space-Hard Ciphers
    Bogdanov, Andrey
    Isobe, Takanori
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1058 - 1069
  • [8] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    Computers and Security, 2022, 117
  • [9] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    COMPUTERS & SECURITY, 2022, 117
  • [10] Predicting process performance: A white-box approach based on process models
    Verenich, Ilya
    Dumas, Marlon
    La Rosa, Marcello
    Nguyen, Hoang
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2019, 31 (06)