Article (Scientific journals)
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Rivain, Matthieu; Wang, Junwei
2019In IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019 (2), p. 225-255
Peer Reviewed verified by ORBi
 

Files


Full Text
tches19.pdf
Publisher postprint (1.21 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
white-box cryptography; internal encoding; differential computation analysis; collision attack; mutual information analysis
Abstract :
[en] White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings is a commonly used white-box technique to protect block cipher implementations. It consists in representing an implementation as a network of look-up tables which are then encoded using randomly generated bijections (the internal encodings). When this approach is implemented based on nibble (i.e. 4-bit wide) encodings, the protected implementation has been shown to be vulnerable to differential computation analysis (DCA). The latter is essentially an adaptation of differential power analysis techniques to computation traces consisting of runtime information, e.g., memory accesses, of the target software. In order to thwart DCA, it has then been suggested to use wider encodings, and in particular byte encodings, at least to protect the outer rounds of the block cipher which are the prime targets of DCA. In this work, we provide an in-depth analysis of when and why DCA works. We pinpoint the properties of the target variables and the encodings that make the attack (in)feasible. In particular, we show that DCA can break encodings wider than 4-bit, such as byte encodings. Additionally, we propose new DCA-like attacks inspired from side-channel analysis techniques. Specifically, we describe a collision attack particularly effective against the internal encoding countermeasure. We also investigate mutual information analysis (MIA) which naturally applies in this context. Compared to the original DCA, these attacks are also passive and they require very limited knowledge of the attacked implementation, but they achieve significant improvements in terms of trace complexity. All the analyses of our work are experimentally backed up with various attack simulation results. We also verified the practicability of our analyses and attack techniques against a publicly available white-box AES implementation protected with byte encodings –which DCA has failed to break before– and against a “masked” white-box AES implementation –which intends to resist DCA.
Disciplines :
Computer science
Author, co-author :
Rivain, Matthieu;  CryptoExperts
Wang, Junwei ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) ; CryptoExperts ; Université Paris 8
External co-authors :
yes
Language :
English
Title :
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Publication date :
18 February 2019
Journal title :
IACR Transactions on Cryptographic Hardware and Embedded Systems
ISSN :
2569-2925
Publisher :
Ruhr-University of Bochum, Bochum, Germany
Volume :
2019
Issue :
2
Pages :
225-255
Peer reviewed :
Peer Reviewed verified by ORBi
Focus Area :
Security, Reliability and Trust
European Projects :
H2020 - 643161 - ECRYPT-NET - European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud
Name of the research project :
ECRYPT-NET
Funders :
UE - Union Européenne [BE]
CE - Commission Européenne [BE]
Available on ORBilu :
since 18 October 2020

Statistics


Number of views
70 (1 by Unilu)
Number of downloads
75 (0 by Unilu)

Scopus citations®
 
27
Scopus citations®
without self-citations
26
OpenCitations
 
1

Bibliography


Similar publications



Contact ORBilu