Abstract
Not only have all current scientific white-box AES schemes been mathematically broken, they also face a family of attacks derived from traditional Side Channel Attacks, e.g., Differential Computation Analysis (DCA) introduced by Bos et al. Such attacks are very universal and easy-to-mount – they require neither knowledge of the implementation, nor use of reverse engineering. In this paper, we particularly focus on DCA against white-box AES by Chow et al. which shows lower than \(100\%\) success rate as opposed to other schemes studied by Bos et al. We provide an explanation of this phenomenon while unraveling another weakness in the design of white-box AES by Chow et al. Based on our theoretical results, we propose an extension of the original DCA attack which has a higher chance of key recovery and might be adapted for other schemes.
This work was supported by the Grant Agency of CTU in Prague, grant No. SGS19/109/OHK3/2T/13.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Available at https://whibox-contest.github.io/show/candidate/777. Accessed: August, 2019.
- 2.
Later we will discuss optimal number of traces for this type of WBAES and recommend 200 traces.
References
Pin 3.11 User Guide. https://software.intel.com/sites/landingpage/pintool/docs/97998/Pin/html/. Accessed Aug 2019
Banik, S., Bogdanov, A., Isobe, T., Jepsen, M.: Analysis of software countermeasures for whitebox encryption. IACR Trans. Symmetric Cryptol. 2017, 307–328 (2017)
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Annual International Cryptology Conference, pp. 513–525. Springer (1997)
Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a white box AES implementation. In: Handschuh, H., Hasan, M.A. (eds.) Selected Areas in Cryptography, pp. 227–240. Springer, Heidelberg (2004)
Bock, E.A., Brzuska, C., Michiels, W., Treff, A.: On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography. In: International Conference on Applied Cryptography and Network Security, pp. 103–120. Springer (2018)
Bogdanov, A., Isobe, T., Tischhauser, E.: Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 126–158. Springer (2016)
Bogdanov, A., Wang, J.M., Vejre, S.: Higher-order DCA against standard side-channel countermeasures. In: Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, vol. 11421, p. 118. Springer (2019)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: International conference on the theory and applications of cryptographic techniques, pp. 37–51. Springer (1997)
Bos, J., Hubain, C., Michiels, W., Teuwen, P.: Differential computation analysis: hiding your white-box designs is not enough. In: International Conference on Cryptographic Hardware and Embedded Systems, pp. 215–236. Springer (2016)
Breunesse, C.B., Kizhvatov, I., Muijrers, R., Spruyt, A.: Towards fully automated analysis of whiteboxes: perfect dimensionality reduction for perfect leakage. IACR Cryptology ePrint Archive 2018, 95 (2018)
Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.: A white-box DES implementation for DRM applications. In: Feigenbaum, J. (ed.) Digital Rights Management, pp. 1–15. Springer, Heidelberg (2002)
Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H. (eds.) Selected Areas in Cryptography, pp. 250–270. Springer, Heidelberg (2002)
CryptoExperts: WhibOx 2017 (2017). https://whibox-contest.github.io/2017/. Accessed Aug 2019
Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on AES. In: International Conference on Applied Cryptography and Network Security, pp. 293–306. Springer (2003)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2001, pp. 251–261. Springer, Heidelberg (2001)
Goubin, L., Paillier, P., Rivain, M., Wang, J.: How to reveal the secrets of an obscure white-box implementation. Technical report, Cryptology ePrint Archive, Report 2018/098 (2018). https://eprint.iacr.org/2018/098
Jacob, M., Boneh, D., Felten, E.: Attacking an obfuscated cipher by injecting faults. In: Feigenbaum, J. (ed.) Digital Rights Management, pp. 16–31. Springer, Heidelberg (2002)
Kerckhoffs, A.: La Cryptographie Militaire. Journal des sciences militaires 9, 538 (1883)
Klemsa, J.: Bitwise DPA. Git repository. https://github.com/fakub/BitwiseDPA
Klemsa, J.: Memory Tracing Tools for Intel PIN. Git repository. https://github.com/fakub/MemoryTracingTools
Klemsa, J.: White-Box-DPA-Processing toolkit. Git repository. https://github.com/fakub/White-Box-DPA-Processing
Klinec, D.: White-box attack resistant cryptography (2013)
Koç, Ç.: Cryptographic Engineering. Springer, Boston (2008)
Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, pp. 388–397. Springer (1999)
Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: ACM SIGPLAN Notices, vol. 40, pp. 190–200. ACM (2005)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) Advances in Cryptology-EUROCRYPT ’93, pp. 386–397. Springer, Heidelberg (1993)
Muir, J.A.: A tutorial on white-box AES. Technical report, Cryptology ePrint Archive, Report 2013/104 (2013). http://eprint.iacr.org/2013/104
Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. In: ACM SIGPLAN Notices, vol. 42, pp. 89–100. ACM (2007)
PUB, NIST FIPS: 197: Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 441–0311 (2001)
Rivain, M., Wang, J.: Analysis and improvement of differential computation attacks against internally-encoded white-box implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 225–255 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Klemsa, J., Novotný, M. (2020). Exploiting Linearity in White-Box AES with Differential Computation Analysis. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)