Improvement on a Masked White-Box Cryptographic Implementation

被引:6
|
作者
Lee, Seungkwang [1 ,2 ]
Kim, Myungchul [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Sch Comp, Daejeon 34141, South Korea
[2] ETRI, Cryptog Engn Res Sect, Daejeon 34129, South Korea
关键词
Encoding; Correlation; Software; Encryption; Licenses; White-box cryptography; AES; DCA; collision attack; bucketing attack; countermeasure;
D O I
10.1109/ACCESS.2020.2993651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information, Differential Computation Analysis (DCA) has recovered the secret keys from white-box cryptographic implementations. In order to thwart DCA, a masked white-box implementation was suggested. It was a customized masking technique that randomizes all the values in the lookup tables with different masks. However, the round output was only permuted by byte encodings, not protected by masking. This is the main reason behind the success of DCA variants on the masked white-box implementation. In this paper, we improve the masked white-box cryptography in such a way to protect against DCA variants by obfuscating the round output with random masks. Specifically, we introduce a white-box AES (WB-AES) implementation applying the masking technique to the key-dependent intermediate value and the several outer-round outputs computed by partial bits of the key. Our analysis and experimental results show that the proposed WB-AES can protect against DCA variants including DCA with a 2-byte key guess, collision, and bucketing attacks. This work requires approximately 3.7 times the table size and 0.7 times the number of lookups compared to the previous masked WB-AES.
引用
收藏
页码:90992 / 91004
页数:13
相关论文
共 50 条
  • [1] A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
    Lee, Seungkwang
    Kim, Taesung
    Kang, Yousung
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2602 - 2615
  • [2] A White-Box Cryptographic Implementation for Protecting against Power Analysis
    Lee, Seungkwang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) : 249 - 252
  • [3] An Efficient Masked White-Box Implementation of SM4
    Zhao, Dongyan
    Wang, Yubo
    Li, Yan
    Hu, Xiaobo
    Yu, Yanyan
    Chen, Shi
    Zheng, Shihui
    [J]. ELECTRONICS, 2024, 13 (12)
  • [4] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378
  • [5] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    [J]. SYMMETRY-BASEL, 2021, 13 (06):
  • [6] WAS: improved white-box cryptographic algorithm over AS iteration
    Yang, Yatao
    Zhai, Yuying
    Dong, Hui
    Zhang, Yanshuo
    [J]. CYBERSECURITY, 2023, 6 (01)
  • [7] WAS: improved white-box cryptographic algorithm over AS iteration
    Yatao Yang
    Yuying Zhai
    Hui Dong
    Yanshuo Zhang
    [J]. Cybersecurity, 6
  • [8] On Security of a White-Box Implementation of SHARK
    Shi, Yang
    Fan, Hongfei
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 455 - 471
  • [9] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [10] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278