A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis

被引:20
|
作者
Lee, Seungkwang [1 ]
Kim, Taesung [1 ]
Kang, Yousung [1 ]
机构
[1] Elect & Telecommun Res Inst, Informat Secur Res Div, Daejeon 34129, South Korea
关键词
White-box cryptography; power analysis; differential computation analysis; countermeasure; CRYPTANALYSIS;
D O I
10.1109/TIFS.2018.2825939
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can he performed without detailed knowledge of the target implementation. The success of the gray-box attack is reportedly due to the unbalanced encodings used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to apply the masking technique before encoding intermediate values during the white-box lookup table generation. Because we do not require any random source in runtime, it is possible to perform efficient encryption and decryption using our method. The security and performance analysis shows that the proposed method can be a reliable and efficient countermeasure.
引用
收藏
页码:2602 / 2615
页数:14
相关论文
共 50 条
  • [1] A White-Box Cryptographic Implementation for Protecting against Power Analysis
    Lee, Seungkwang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) : 249 - 252
  • [2] Improvement on a Masked White-Box Cryptographic Implementation
    Lee, Seungkwang
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 90992 - 91004
  • [3] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao Xu
    Chuankun Wu
    Feng Liu
    Ruoxin Zhao
    [J]. Science China Information Sciences, 2018, 61
  • [4] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Xu, Tao
    Wu, Chuankun
    Liu, Feng
    Zhao, Ruoxin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [5] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao XU
    Chuankun WU
    Feng LIU
    Ruoxin ZHAO
    [J]. Science China(Information Sciences), 2018, 61 (03) : 237 - 239
  • [6] Analysis and improvement of differential computation attacks against internally-encoded white-box implementations
    Rivain, Matthieu
    Wang, Junwei
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 225 - 255
  • [7] An Efficient Masked White-Box Implementation of SM4
    Zhao, Dongyan
    Wang, Yubo
    Li, Yan
    Hu, Xiaobo
    Yu, Yanyan
    Chen, Shi
    Zheng, Shihui
    [J]. ELECTRONICS, 2024, 13 (12)
  • [8] Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
    Bos, Joppe W.
    Hubain, Charles
    Michiels, Wil
    Teuwen, Philippe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 215 - 236
  • [9] Differential Computation Analysis of White-box SM4 Scheme
    Yuan, Zi-Qing
    Chen, Jie
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (08): : 3891 - 3904
  • [10] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278