White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -

被引:12
|
作者
Sasdrich, Pascal [1 ]
Moradi, Amir [1 ]
Gueneysu, Tim [2 ,3 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Univ Bremen, Bremen, Germany
[3] DFKI, Bremen, Germany
来源
关键词
POWER ANALYSIS; CRYPTANALYSIS;
D O I
10.1007/978-3-662-52993-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-box scenario, however, the property of hiding required implementation details from the attacker could be used as a promising mitigation strategy against side-channel attacks (SCA). In this work, we present a first white-box implementation of AES on reconfigurable hardware for which we evaluate this approach assuming a gray-box attacker. We show that - unfortunately such an implementation does not provide sufficient protection against an SCA attacker. We continue our evaluations by a thorough analysis of the source of the observed leakage, and present additional results which can be used to build stronger white-box designs.
引用
收藏
页码:185 / 203
页数:19
相关论文
共 50 条
  • [41] Research on disturbing white-box cryptography algorithm based on local differential privacy
    Luo, Wenjun
    Lai, Die
    Dai, Zesen
    [J]. SECURITY AND PRIVACY, 2023, 6 (06):
  • [42] White-Box Atomic Multicast
    Gotsman, Alexey
    Lefort, Anatole
    Chockler, Gregory
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 176 - 187
  • [43] A White-Box Cryptographic Implementation for Protecting against Power Analysis
    Lee, Seungkwang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) : 249 - 252
  • [44] An Efficient Masked White-Box Implementation of SM4
    Zhao, Dongyan
    Wang, Yubo
    Li, Yan
    Hu, Xiaobo
    Yu, Yanyan
    Chen, Shi
    Zheng, Shihui
    [J]. ELECTRONICS, 2024, 13 (12)
  • [45] Comparing White-box and Black-box Test Prioritization
    Henard, Christopher
    Papadakis, Mike
    Harman, Mark
    Jia, Yue
    Le Traon, Yves
    [J]. 2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 523 - 534
  • [46] Beating White-Box Defenses with Black-Box Attacks
    Kumova, Vera
    Pilat, Martin
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [47] Implementation White Box Cryptography in Substitution-Permutation network
    Levina, Alla
    Kamnev, Ivan
    Zikratov, Igor
    [J]. 2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 621 - 623
  • [48] Safety Assessment: From Black-Box to White-Box
    Kurzidem, Iwo
    Misik, Adam
    Schleiss, Philipp
    Burton, Simon
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2022), 2022, : 295 - 300
  • [49] Efficient and Provable White-Box Primitives
    Fouque, Pierre-Alain
    Karpman, Pierre
    Kirchner, Paul
    Minaud, Brice
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
  • [50] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378