首页> 外文会议>International workshop on constructive side-channel analysis and secure design >Another Look on Bucketing Attack to Defeat White-Box Implementations
【24h】

Another Look on Bucketing Attack to Defeat White-Box Implementations

机译:铲斗式攻击以击败白盒实现的另一种观点

获取原文
获取外文期刊封面目录资料

摘要

White-box cryptography was first introduced by Chow et al. in 2002 as a software technique for implementing cryptographic algorithms in a secure way that protects secret keys in a compromised environment. Ever since, Chow et al.'s design has been subject to mainly two categories of attacks published by the cryptographic community: The first category encompasses the so-called differential and algebraic cryptanalysis. Basically, these attacks counteract the obfuscation process by inverting the applied encoding functions after which the used secret key can easily be recovered. The second category comprises the software counterpart of the well-known physical attacks often applied to thwart hardware cryptographic implementations on embedded devices. In this paper, we turn a cryptanalysis technique, called statistical bucketing attack, into a computational analysis one allowing an efficient key recovery from software execution traces. Moreover, we extend this cryptanalysis technique, originally designed to break DES white-box implementations, to target AES white-box implementations. To illustrate the effectiveness of our proposal, we apply our attack on several publicly available white-box implementations with different level of protections. Based on the obtained results, we argue that our attack is not only an alternative but also a more efficient technique compared to the existing computational attacks, especially when some side-channel countermea-sures are involved as a protection.
机译:白盒密码术最初是由Chow等人引入的。这是2002年的一项软件技术,用于以安全的方式实施加密算法,从而在受到威胁的环境中保护秘密密钥。从那时起,Chow等人的设计主要受到密码学界发布的两类攻击:第一类包含所谓的差分和代数密码分析。基本上,这些攻击通过反转应用的编码功能来抵消混淆过程,此后可以很容易地恢复使用过的秘密密钥。第二类包括通常用于阻止嵌入式设备上的硬件加密实现的众所周知的物理攻击的软件对应物。在本文中,我们将一种称为统计存储桶攻击的密码分析技术转变为一种计算分析技术,该技术可以从软件执行跟踪中高效地恢复密钥。此外,我们将最初旨在打破DES白盒实现的密码分析技术扩展到了AES白盒实现。为了说明我们的建议的有效性,我们将攻击应用于具有不同保护级别的几种可公开获得的白盒实施方案。根据获得的结果,我们认为与现有的计算攻击相比,我们的攻击不仅是一种替代方法,而且是一种更有效的技术,尤其是当涉及一些侧信道对策作为保护时。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号