A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers

被引:0
|
作者
Deng, Tongxia [1 ]
Li, Ping [1 ]
Yang, Shunzhi [1 ,4 ]
Zhang, Yupeng [1 ]
Gong, Zheng [1 ]
Duan, Ming [2 ]
Luo, Yiyuan [3 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou, Peoples R China
[2] Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
[3] Huizhou Univ, Sch Comp Sci & Engn, Huizhou, Peoples R China
[4] Shenzhen Polytech, Inst Appl Artificial Intelligence Guangdong HongK, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
White-box block cipher; Side-channel analysis; Noisy rounds; Deep learning; AES; ATTACKS;
D O I
10.1007/978-3-031-41181-6_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It has been proven that side-channel analysis such as differential computation/fault analysis can break white-box implementations without reverse engineering efforts. In 2020, Sun et al. proposed noisy rounds as a countermeasure to mitigate the side-channel attacks on white-box block ciphers. The principle is to desynchronize the computation traces of cryptographic implementations by introducing several redundant round functions. In this paper, we propose a multi-label classification method and three deep-learning models (CNN, RNN, and CRNN) to predict the locations of the obfuscated rounds. The experimental results show that the obfuscation of noisy rounds also could not be identified by the deep-learning model. However, the RNN is more effective than the CNN and CRNN with fewer time costs. Subsequently, we investigate the influence of specific components such as the key, affine masking, and transformation matrix on round obfuscation recognition. The extended experiments demonstrate that without the transformation matrix, the deep learning models can successfully distinguish the noisy rounds.
引用
收藏
页码:419 / 438
页数:20
相关论文
共 50 条
  • [21] A Generic Attack against White Box Implementation of Block Ciphers
    Jia, Yin
    Lin, TingTing
    Lai, Xuejia
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2016, : 139 - 143
  • [22] Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
    Di Crescenzo, Giovanni
    Bahler, Lisa
    McIntosh, Allen
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [23] Simplified Way of Learning White-Box Testing with JUnit
    Sung, Keum-Young
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 783 - 789
  • [24] Considering Execution Environment Resilience: A White-Box Approach
    Klikovits, Stefan
    Lawrence, David P. Y.
    Gonzalez-Berges, Manuel
    Buchs, Didier
    SOFTWARE ENGINEERING FOR RESILIENT SYSTEMS (SERENE 2015), 2015, 9274 : 46 - 61
  • [25] DeepMirTar: a deep-learning approach for predicting human miRNA targets
    Wen, Ming
    Cong, Peisheng
    Zhang, Zhimin
    Lu, Hongmei
    Li, Tonghua
    BIOINFORMATICS, 2018, 34 (22) : 3781 - 3787
  • [26] Measuring Performances of a White-Box Approach in the IoT Context
    Albricci, Daniele Giacomo Vittorio
    Ceria, Michela
    Cioschi, Federico
    Fornari, Nicolo
    Shakiba, Arvin
    Visconti, Andrea
    SYMMETRY-BASEL, 2019, 11 (08):
  • [27] White-Box Performance-Influence Models: A Profiling and Learning Approach (Replication Package)
    Weber, Max
    Apel, Sven
    Siegmund, Norbert
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 232 - 233
  • [28] White-Box Adversarial Attacks on Deep Learning-Based Radio Frequency Fingerprint Identification
    Ma, Jie
    Zhang, Junqing
    Shen, Guanxiong
    Marshall, Alan
    Chang, Chip-Hong
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3714 - 3719
  • [29] WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations
    Tang, Yufeng
    Gong, Zheng
    Sun, Tao
    Chen, Jinhai
    Liu, Zhe
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3375 - 3388
  • [30] Towards practical white-box lightweight block cipher implementations for IoTs
    Zhou, Lu
    Su, Chunhua
    Wen, Yamin
    Li, Weijie
    Gong, Zheng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 507 - 514