How to reveal the secrets of an obscure white-box implementation.
Gespeichert in:
| Titel: | How to reveal the secrets of an obscure white-box implementation. |
|---|---|
| Autoren: | Goubin, Louis, Paillier, Pascal, Rivain, Matthieu, Wang, Junwei |
| Quelle: | Journal of Cryptographic Engineering; Apr2020, Vol. 10 Issue 1, p49-66, 18p |
| Abstract: | White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge. [ABSTRACT FROM AUTHOR] |
| Copyright of Journal of Cryptographic Engineering is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Datenbank: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=21908508&ISBN=&volume=10&issue=1&date=20200401&spage=49&pages=49-66&title=Journal of Cryptographic Engineering&atitle=How%20to%20reveal%20the%20secrets%20of%20an%20obscure%20white-box%20implementation.&aulast=Goubin%2C%20Louis&id=DOI:10.1007/s13389-019-00207-5 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Goubin%20L Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 142491360 RelevancyScore: 900 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 899.60205078125 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: How to reveal the secrets of an obscure white-box implementation. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Goubin%2C+Louis%22">Goubin, Louis</searchLink><br /><searchLink fieldCode="AR" term="%22Paillier%2C+Pascal%22">Paillier, Pascal</searchLink><br /><searchLink fieldCode="AR" term="%22Rivain%2C+Matthieu%22">Rivain, Matthieu</searchLink><br /><searchLink fieldCode="AR" term="%22Wang%2C+Junwei%22">Wang, Junwei</searchLink> – Name: TitleSource Label: Source Group: Src Data: Journal of Cryptographic Engineering; Apr2020, Vol. 10 Issue 1, p49-66, 18p – Name: Abstract Label: Abstract Group: Ab Data: White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Journal of Cryptographic Engineering is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=142491360 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1007/s13389-019-00207-5 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 18 StartPage: 49 Titles: – TitleFull: How to reveal the secrets of an obscure white-box implementation. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Goubin, Louis – PersonEntity: Name: NameFull: Paillier, Pascal – PersonEntity: Name: NameFull: Rivain, Matthieu – PersonEntity: Name: NameFull: Wang, Junwei IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 04 Text: Apr2020 Type: published Y: 2020 Identifiers: – Type: issn-print Value: 21908508 Numbering: – Type: volume Value: 10 – Type: issue Value: 1 Titles: – TitleFull: Journal of Cryptographic Engineering Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science