...
首页> 外文期刊>Journal of cryptographic engineering >How to reveal the secrets of an obscure white-box implementation
【24h】

How to reveal the secrets of an obscure white-box implementation

机译:如何揭示一个模糊的白盒实施的秘密

获取原文
获取原文并翻译 | 示例
           

摘要

White-box cryptography (WBC) protects key extraction from software implementations of cryptographic primitives. Many academic works have been done achieving partial results toward WBC, but a complete solution has not been found yet by the cryptography community. As a result, the industry can only on proprietary and non-publicly scrutinized white-box implementations. It is therefore of interest to investigate the obtainable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submissions. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken, and only 13 of them held more than one day. The strongest (in terms of surviving time) implementation survived for 28 days (which is more than twice as much as the second one). It was only broken by the authors of the present paper with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge.
机译:白盒加密(WBC)保护从加密原语的软件实现中的密钥提取。许多学术作品已经完成了WBC的部分结果,但是通过加密社区尚未发现完整的解决方案。因此,该行业只能在专有和非公开审查的白盒实施。因此,调查AES实施的可获得的抵抗挫败这条范式的白盒反对者是有意义的。为此目的,Ecrypt CSA项目组织了作为2017年Ches旗帜挑战的Whibox竞赛。通过使用自由提交AES-128白盒实施的源代码来邀请研究人员和工程师作为设计师参与通过尝试在提交中提取硬编码密钥来选择密钥,或作为断路器。与会者预计将披露其身份或潜在的设计/攻击技巧。最后,94个提交的挑战都被破坏了,其中只有13个超过一天。最强(在存活时间方面)实施幸存下来28天(其两倍多为第二个)。它仅被本文的作者打破了逆向工程和代数分析。在本文中,我们详细描述了密码分析的不同步骤。然后,我们将其概括为攻击方法,以便进一步掩盖白盒实施。特别是,我们正式化和概括了我们用于从目标挑战的编码中间变量中提取密钥的线性解码分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号