Revisiting Higher-order Computational Attacks against White-box Implementations

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in an untrusted environment. Ever since, Chow et al.’s design has been subject to the well-known Differential Computation Analysis (DCA). To resist DCA, a natural approach that white-box designers investigated is to apply the common side-channel countermeasures such as masking. In this paper, we suggest applying the well-studied leakage detection methods to assess the security of masked white-box implementations. Then, we extend some well-known side-channel attacks (i.e. the bucketing computation analysis, the mutual information analysis, and the collision attack) to the higher-order case to defeat higher-order masked white-box implementations. To illustrate the effectiveness of these attacks, we perform a practical evaluation against a first-order masked white-box implementation. The obtained results have demonstrated the practicability of these attacks in a real-world scenario.

Cite

CITATION STYLE

APA

Maghrebi, H., & Alessio, D. (2020). Revisiting Higher-order Computational Attacks against White-box Implementations. In International Conference on Information Systems Security and Privacy (pp. 265–272). Science and Technology Publications, Lda. https://doi.org/10.5220/0008874602650272

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free