A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis

被引:20
|
作者
Lee, Seungkwang [1 ]
Kim, Taesung [1 ]
Kang, Yousung [1 ]
机构
[1] Elect & Telecommun Res Inst, Informat Secur Res Div, Daejeon 34129, South Korea
关键词
White-box cryptography; power analysis; differential computation analysis; countermeasure; CRYPTANALYSIS;
D O I
10.1109/TIFS.2018.2825939
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can he performed without detailed knowledge of the target implementation. The success of the gray-box attack is reportedly due to the unbalanced encodings used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to apply the masking technique before encoding intermediate values during the white-box lookup table generation. Because we do not require any random source in runtime, it is possible to perform efficient encryption and decryption using our method. The security and performance analysis shows that the proposed method can be a reliable and efficient countermeasure.
引用
收藏
页码:2602 / 2615
页数:14
相关论文
共 50 条
  • [41] DWB-AES: an implementation of dynamic white-box based on AES
    Wang, Bin
    Chen, Si
    Chen, Jiadong
    Wang, Xing
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 177 - 186
  • [42] A White-Box Speck Implementation Using Self-equivalence Encodings
    Vandersmissen, Joachim
    Ranea, Adrian
    Preneel, Bart
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 771 - 791
  • [43] White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
    Zhou, Jie
    Bai, Jian
    Jiang, Meng Shan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [44] White-box cryptographic video data sharing system based on SM4 algorithm
    Wu, Zhen
    Bai, Jian
    Li, Dashuang
    Li, Bin
    Zeng, Bing
    Zhang, Zhengqiang
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2020, 46 (09): : 1660 - 1669
  • [45] Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
    Biryukov, Alex
    Bouillaguet, Charles
    Khovratovich, Dmitry
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 63 - 84
  • [46] Boundary Value Analysis in Automatic White-box Test Generation
    Zhang, Zhiqiang
    Wu, Tianyong
    Zhang, Jian
    [J]. 2015 IEEE 26TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2015, : 239 - 249
  • [47] White-Box Error Effect Simulation for Assisted Safety Analysis
    Reiter, Sebastian
    Viehl, Alexander
    Bringmann, Oliver
    Rosenstiel, Wolfgang
    [J]. 2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 534 - 538
  • [48] A White-box Implementation of SM4 with Self-equivalence Encoding
    Chen, Jie
    Luo, Yinuo
    Liu, Jun
    Wang, Chao
    Zhang, Yueyu
    Dong, Xiaoli
    [J]. COMPUTER JOURNAL, 2023, 67 (03): : 1087 - 1098
  • [49] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    [J]. IET INFORMATION SECURITY, 2021, : 18 - 27
  • [50] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    [J]. IET Information Security, 2022, 16 (01) : 18 - 27