LPN-based Attacks in the White-box Setting

Uloženo v:
Podrobná bibliografie
Název: LPN-based Attacks in the White-box Setting
Autoři: CHARLÈS, Alex, UDOVENKO, Aleksei
Přispěvatelé: Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography
Zdroj: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (4), 318 - 343 (2023-08-31)
Informace o vydavateli: Ruhr-University of Bochum
Rok vydání: 2023
Sbírka: University of Luxembourg: ORBilu - Open Repository and Bibliography
Témata: Cryptanalysis, DCA, Dummy Shuffling, LDA, LPN, Masking, White-box Cryptography, Learning parity with noise, Linear decoding, Linear decoding analyse attack, Masking schemes, White-box cryptographies, Software, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Popis: peer reviewed ; In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks. A standard side-channel countermeasure, Ishai-Sahai-Wagner’s masking scheme (ISW, CRYPTO 2003) prevents Differential Computation Analysis but was shown to be vulnerable in the white-box context to the Linear Decoding Analysis attack (LDA). However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity. In this work, we study the relationship between the security of these and related schemes to the Learning Parity with Noise (LPN) problem and propose a new automated attack by applying an LPN-solving algorithm to white-box implementations. The attack effectively exploits strong linear approximations of the masking scheme and thus can be seen as a combination of the DCA and LDA techniques. Different from previous attacks, the complexity of this algorithm depends on the approximation error, henceforth allowing new practical attacks on masking schemes which previously resisted automated analysis. We demonstrate it theoretically and experimentally, exposing multiple cases where the LPN-based method significantly outperforms LDA and DCA methods, including their higher-order variants. This work applies the LPN problem beyond its usual post-quantum cryptography boundary, strengthening its interest for the cryptographic community, while expanding the range of automated attacks by presenting a new direction for breaking masking schemes in the white-box model. ; R-AGR-3748 - C19/IS/13641232/APLICA (01/09/2020 - 30/08/2022) - BIRYUKOV Alexei
Druh dokumentu: article in journal/newspaper
Jazyk: English
ISSN: 2569-2925
Relation: https://tches.iacr.org/index.php/TCHES/article/download/11168/10607; FNR13641232 - Analysis And Protection Of Lightweight Cryptographic Algorithms, 2019 (01/01/2021-31/12/2023) - Alex Biryukov; urn:issn:2569-2925; https://orbilu.uni.lu/handle/10993/57631; info:hdl:10993/57631; https://orbilu.uni.lu/bitstream/10993/57631/1/TCHES2023_4_13.pdf
DOI: 10.46586/tches.v2023.i4.318-343
Dostupnost: https://orbilu.uni.lu/handle/10993/57631
https://orbilu.uni.lu/bitstream/10993/57631/1/TCHES2023_4_13.pdf
https://doi.org/10.46586/tches.v2023.i4.318-343
Rights: open access ; http://purl.org/coar/access_right/c_abf2 ; info:eu-repo/semantics/openAccess
Přístupové číslo: edsbas.5CD3CE7B
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://orbilu.uni.lu/handle/10993/57631#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=CHARL%C3%88S%20A
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.5CD3CE7B
RelevancyScore: 944
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 943.653564453125
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: LPN-based Attacks in the White-box Setting
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22CHARLÈS%2C+Alex%22">CHARLÈS, Alex</searchLink><br /><searchLink fieldCode="AR" term="%22UDOVENKO%2C+Aleksei%22">UDOVENKO, Aleksei</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography
– Name: TitleSource
  Label: Source
  Group: Src
  Data: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (4), 318 - 343 (2023-08-31)
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: Ruhr-University of Bochum
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2023
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: University of Luxembourg: ORBilu - Open Repository and Bibliography
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Cryptanalysis%22">Cryptanalysis</searchLink><br /><searchLink fieldCode="DE" term="%22DCA%22">DCA</searchLink><br /><searchLink fieldCode="DE" term="%22Dummy+Shuffling%22">Dummy Shuffling</searchLink><br /><searchLink fieldCode="DE" term="%22LDA%22">LDA</searchLink><br /><searchLink fieldCode="DE" term="%22LPN%22">LPN</searchLink><br /><searchLink fieldCode="DE" term="%22Masking%22">Masking</searchLink><br /><searchLink fieldCode="DE" term="%22White-box+Cryptography%22">White-box Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Learning+parity+with+noise%22">Learning parity with noise</searchLink><br /><searchLink fieldCode="DE" term="%22Linear+decoding%22">Linear decoding</searchLink><br /><searchLink fieldCode="DE" term="%22Linear+decoding+analyse+attack%22">Linear decoding analyse attack</searchLink><br /><searchLink fieldCode="DE" term="%22Masking+schemes%22">Masking schemes</searchLink><br /><searchLink fieldCode="DE" term="%22White-box+cryptographies%22">White-box cryptographies</searchLink><br /><searchLink fieldCode="DE" term="%22Software%22">Software</searchLink><br /><searchLink fieldCode="DE" term="%22Engineering%22">Engineering</searchLink><br /><searchLink fieldCode="DE" term="%22computing+%26+technology%22">computing & technology</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+science%22">Computer science</searchLink><br /><searchLink fieldCode="DE" term="%22Ingénierie%22">Ingénierie</searchLink><br /><searchLink fieldCode="DE" term="%22informatique+%26+technologie%22">informatique & technologie</searchLink><br /><searchLink fieldCode="DE" term="%22Sciences+informatiques%22">Sciences informatiques</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: peer reviewed ; In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks. A standard side-channel countermeasure, Ishai-Sahai-Wagner’s masking scheme (ISW, CRYPTO 2003) prevents Differential Computation Analysis but was shown to be vulnerable in the white-box context to the Linear Decoding Analysis attack (LDA). However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity. In this work, we study the relationship between the security of these and related schemes to the Learning Parity with Noise (LPN) problem and propose a new automated attack by applying an LPN-solving algorithm to white-box implementations. The attack effectively exploits strong linear approximations of the masking scheme and thus can be seen as a combination of the DCA and LDA techniques. Different from previous attacks, the complexity of this algorithm depends on the approximation error, henceforth allowing new practical attacks on masking schemes which previously resisted automated analysis. We demonstrate it theoretically and experimentally, exposing multiple cases where the LPN-based method significantly outperforms LDA and DCA methods, including their higher-order variants. This work applies the LPN problem beyond its usual post-quantum cryptography boundary, strengthening its interest for the cryptographic community, while expanding the range of automated attacks by presenting a new direction for breaking masking schemes in the white-box model. ; R-AGR-3748 - C19/IS/13641232/APLICA (01/09/2020 - 30/08/2022) - BIRYUKOV Alexei
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: ISSN
  Label: ISSN
  Group: ISSN
  Data: 2569-2925
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: https://tches.iacr.org/index.php/TCHES/article/download/11168/10607; FNR13641232 - Analysis And Protection Of Lightweight Cryptographic Algorithms, 2019 (01/01/2021-31/12/2023) - Alex Biryukov; urn:issn:2569-2925; https://orbilu.uni.lu/handle/10993/57631; info:hdl:10993/57631; https://orbilu.uni.lu/bitstream/10993/57631/1/TCHES2023_4_13.pdf
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.46586/tches.v2023.i4.318-343
– Name: URL
  Label: Availability
  Group: URL
  Data: https://orbilu.uni.lu/handle/10993/57631<br />https://orbilu.uni.lu/bitstream/10993/57631/1/TCHES2023_4_13.pdf<br />https://doi.org/10.46586/tches.v2023.i4.318-343
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: open access ; http://purl.org/coar/access_right/c_abf2 ; info:eu-repo/semantics/openAccess
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.5CD3CE7B
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.5CD3CE7B
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.46586/tches.v2023.i4.318-343
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Cryptanalysis
        Type: general
      – SubjectFull: DCA
        Type: general
      – SubjectFull: Dummy Shuffling
        Type: general
      – SubjectFull: LDA
        Type: general
      – SubjectFull: LPN
        Type: general
      – SubjectFull: Masking
        Type: general
      – SubjectFull: White-box Cryptography
        Type: general
      – SubjectFull: Learning parity with noise
        Type: general
      – SubjectFull: Linear decoding
        Type: general
      – SubjectFull: Linear decoding analyse attack
        Type: general
      – SubjectFull: Masking schemes
        Type: general
      – SubjectFull: White-box cryptographies
        Type: general
      – SubjectFull: Software
        Type: general
      – SubjectFull: Engineering
        Type: general
      – SubjectFull: computing & technology
        Type: general
      – SubjectFull: Computer science
        Type: general
      – SubjectFull: Ingénierie
        Type: general
      – SubjectFull: informatique & technologie
        Type: general
      – SubjectFull: Sciences informatiques
        Type: general
    Titles:
      – TitleFull: LPN-based Attacks in the White-box Setting
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: CHARLÈS, Alex
      – PersonEntity:
          Name:
            NameFull: UDOVENKO, Aleksei
      – PersonEntity:
          Name:
            NameFull: Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2023
          Identifiers:
            – Type: issn-print
              Value: 25692925
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (4), 318 - 343 (2023-08-31
              Type: main
ResultId 1