Cryptology ePrint Archive: Report 2017/267

A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis

Seungkwang Lee

Abstract: Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge of the target implementation. The success of the gray-box attack is reportedly due to the unbalanced encoding used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to apply the masking technique before encoding intermediate values during the white-box lookup table generation. Because we do not require any random source in runtime, it is possible to perform efficient encryption and decryption using our method. The security and performance analysis shows that the proposed method can be a reliable and efficient countermeasure.

Category / Keywords: implementation / White-box cryptography, power analysis, differential computation analysis, countermeasure.

Date: received 22 Mar 2017, last revised 18 Jun 2017

Contact author: skwang at etri re kr

Available format(s): PDF | BibTeX Citation

Version: 20170619:021107 (All versions of this report)

Short URL: ia.cr/2017/267

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]