Abstract
White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in an untrusted environment. Ever since, Chow et al.’s design has been subject to the well-known Differential Computation Analysis (DCA). To resist DCA, a natural approach that white-box designers investigated is to apply the common side-channel countermeasures such as masking. In this paper, we suggest applying the well-studied leakage detection methods to assess the security of masked white-box implementations. Then, we extend some well-known side-channel attacks (i.e. the bucketing computation analysis, the mutual information analysis, and the collision attack) to the higher-order case to defeat higher-order masked white-box implementations. To illustrate the effectiveness of these attacks, we perform a practical evaluation against a first-order masked white-box implementation. The obtained results have demonstrated the practicability of these attacks in a real-world scenario.
Author supplied keywords
Cite
CITATION STYLE
Maghrebi, H., & Alessio, D. (2020). Revisiting Higher-order Computational Attacks against White-box Implementations. In International Conference on Information Systems Security and Privacy (pp. 265–272). Science and Technology Publications, Lda. https://doi.org/10.5220/0008874602650272
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.