Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
Attacks and Countermeasures for White-box Designs
BIRYUKOV, Alex; UDOVENKO, Aleksei
2018In Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018
Peer reviewed
 

Documents


Texte intégral
WhiteBoxAttacksCountermeasures.pdf
Postprint Auteur (502.02 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
white-box; obfuscation; cryptanalysis
Résumé :
[en] In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
BIRYUKOV, Alex ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
UDOVENKO, Aleksei  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
Attacks and Countermeasures for White-box Designs
Date de publication/diffusion :
novembre 2018
Nom de la manifestation :
24th International Conference on the Theory and Application of Cryptology and Information Security
Organisateur de la manifestation :
International Association for Cryptologic Research
Lieu de la manifestation :
Brisbane, Australie
Date de la manifestation :
from 02-12-2018 to 06-12-2018
Manifestation à portée :
International
Titre de l'ouvrage principal :
Advances in Cryptology – ASIACRYPT 2018
Editeur scientifique :
Peyrin, Thomas
Galbraith, Steven
Maison d'édition :
Springer International Publishing
ISBN/EAN :
978-3-030-03328-6
Collection et n° de collection :
Lecture Notes in Computer Science, 11273
Pagination :
373-402
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Organisme subsidiant :
FNR - Fonds National de la Recherche
Disponible sur ORBilu :
depuis le 11 janvier 2018

Statistiques


Nombre de vues
851 (dont 21 Unilu)
Nombre de téléchargements
962 (dont 22 Unilu)

OpenCitations
 
1
citations OpenAlex
 
41

Bibliographie


Publications similaires



Contacter ORBilu