Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough

被引:58
|
作者
Bos, Joppe W. [1 ]
Hubain, Charles [2 ,4 ]
Michiels, Wil [1 ,3 ]
Teuwen, Philippe [2 ,4 ]
机构
[1] NXP Semicond, Leuven, Belgium
[2] Quarkslab, Paris, France
[3] Tech Univ Eindhoven, Eindhoven, Netherlands
[4] NXP Semicond, Innovat Ctr Crypto & Secur, Leuven, Belgium
关键词
POWER ANALYSIS; CRYPTANALYSIS; AES; DES; IMPLEMENTATIONS; ATTACKS;
D O I
10.1007/978-3-662-53140-2_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. In this paper, we present a new approach to assess the security of white-box implementations which requires neither knowledge about the look-up tables used nor any reverse engineering effort. This differential computation analysis (DCA) attack is the software counterpart of the differential power analysis attack as applied by the cryptographic hardware community. We developed plugins to widely available dynamic binary instrumentation frameworks to produce software execution traces which contain information about the memory addresses being accessed. To illustrate its effectiveness, we show how DCA can extract the secret key from numerous publicly (non-commercial) available white-box programs implementing standardized cryptography by analyzing these traces to identify secret-key dependent correlations. This approach allows one to extract the secret key material from white-box implementations significantly faster and without specific knowledge of the white-box design in an automated manner.
引用
收藏
页码:215 / 236
页数:22
相关论文
共 27 条
  • [1] Differential Computation Analysis of White-box SM4 Scheme
    Yuan, Zi-Qing
    Chen, Jie
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (08): : 3891 - 3904
  • [2] A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
    Lee, Seungkwang
    Kim, Taesung
    Kang, Yousung
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2602 - 2615
  • [3] Enhanced Encodings for White-Box Designs
    Battistello, Alberto
    Castelnovi, Laurent
    Chabrier, Thomas
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 254 - 274
  • [4] Analysis and improvement of differential computation attacks against internally-encoded white-box implementations
    Rivain, Matthieu
    Wang, Junwei
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 225 - 255
  • [5] Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations
    Tang, Yufeng
    Gong, Zheng
    Li, Bin
    Zhao, Liangju
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 493 - 522
  • [6] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
  • [7] Boundary Value Analysis in Automatic White-box Test Generation
    Zhang, Zhiqiang
    Wu, Tianyong
    Zhang, Jian
    [J]. 2015 IEEE 26TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2015, : 239 - 249
  • [8] White-Box Error Effect Simulation for Assisted Safety Analysis
    Reiter, Sebastian
    Viehl, Alexander
    Bringmann, Oliver
    Rosenstiel, Wolfgang
    [J]. 2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 534 - 538
  • [9] A White-Box Cryptographic Implementation for Protecting against Power Analysis
    Lee, Seungkwang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) : 249 - 252
  • [10] ConfigCrusher: towards white-box performance analysis for configurable systems
    Miguel Velez
    Pooyan Jamshidi
    Florian Sattler
    Norbert Siegmund
    Sven Apel
    Christian Kästner
    [J]. Automated Software Engineering, 2020, 27 : 265 - 300