A White-Box Cryptographic Implementation for Protecting against Power Analysis

被引:3
|
作者
Lee, Seungkwang [1 ]
机构
[1] ETRI, Daejeon, South Korea
关键词
white-box cryptography; power analysis; countermeasure;
D O I
10.1587/transinf.2017EDL8186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encoded lookup tables used in white-box cryptography are known to be vulnerable to power analysis due to the imbalanced encoding. This means that the countermeasures against white-box attacks can not even defend against gray-box attacks. For this reason, those who want to defend against power analysis through the white-box cryptographic implementation need to find other ways. In this paper, we propose a method to defend power analysis without resolving the problematic encoding problem. Compared with the existing white-box cryptography techniques, the proposed method has twice the size of the lookup table and nearly the same amount of computation.
引用
收藏
页码:249 / 252
页数:4
相关论文
共 50 条
  • [1] A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
    Lee, Seungkwang
    Kim, Taesung
    Kang, Yousung
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2602 - 2615
  • [2] Improvement on a Masked White-Box Cryptographic Implementation
    Lee, Seungkwang
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 90992 - 91004
  • [3] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Xu, Tao
    Wu, Chuankun
    Liu, Feng
    Zhao, Ruoxin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [4] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao Xu
    Chuankun Wu
    Feng Liu
    Ruoxin Zhao
    [J]. Science China Information Sciences, 2018, 61
  • [5] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao XU
    Chuankun WU
    Feng LIU
    Ruoxin ZHAO
    [J]. Science China(Information Sciences), 2018, 61 (03) : 237 - 239
  • [6] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
  • [7] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378
  • [8] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    [J]. SYMMETRY-BASEL, 2021, 13 (06):
  • [9] Protecting White-Box AES with Dual Ciphers
    Karroumi, Mohamed
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 278 - 291
  • [10] WAS: improved white-box cryptographic algorithm over AS iteration
    Yang, Yatao
    Zhai, Yuying
    Dong, Hui
    Zhang, Yanshuo
    [J]. CYBERSECURITY, 2023, 6 (01)