How to reveal the secrets of an obscure white-box implementation.

Gespeichert in:
Bibliographische Detailangaben
Titel: How to reveal the secrets of an obscure white-box implementation.
Autoren: Goubin, Louis, Paillier, Pascal, Rivain, Matthieu, Wang, Junwei
Quelle: Journal of Cryptographic Engineering; Apr2020, Vol. 10 Issue 1, p49-66, 18p
Abstract: White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Cryptographic Engineering is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Datenbank: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=21908508&ISBN=&volume=10&issue=1&date=20200401&spage=49&pages=49-66&title=Journal of Cryptographic Engineering&atitle=How%20to%20reveal%20the%20secrets%20of%20an%20obscure%20white-box%20implementation.&aulast=Goubin%2C%20Louis&id=DOI:10.1007/s13389-019-00207-5
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Goubin%20L
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 142491360
RelevancyScore: 900
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 899.60205078125
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: How to reveal the secrets of an obscure white-box implementation.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Goubin%2C+Louis%22">Goubin, Louis</searchLink><br /><searchLink fieldCode="AR" term="%22Paillier%2C+Pascal%22">Paillier, Pascal</searchLink><br /><searchLink fieldCode="AR" term="%22Rivain%2C+Matthieu%22">Rivain, Matthieu</searchLink><br /><searchLink fieldCode="AR" term="%22Wang%2C+Junwei%22">Wang, Junwei</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Journal of Cryptographic Engineering; Apr2020, Vol. 10 Issue 1, p49-66, 18p
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of Journal of Cryptographic Engineering is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=142491360
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1007/s13389-019-00207-5
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 18
        StartPage: 49
    Titles:
      – TitleFull: How to reveal the secrets of an obscure white-box implementation.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Goubin, Louis
      – PersonEntity:
          Name:
            NameFull: Paillier, Pascal
      – PersonEntity:
          Name:
            NameFull: Rivain, Matthieu
      – PersonEntity:
          Name:
            NameFull: Wang, Junwei
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 04
              Text: Apr2020
              Type: published
              Y: 2020
          Identifiers:
            – Type: issn-print
              Value: 21908508
          Numbering:
            – Type: volume
              Value: 10
            – Type: issue
              Value: 1
          Titles:
            – TitleFull: Journal of Cryptographic Engineering
              Type: main
ResultId 1