Cryptology ePrint Archive: Report 2017/267
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Abstract: Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge of the target implementation. The success of the gray-box attack is due to the unbalanced encoding used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to use Boolean masking before encoding intermediate values during the white-box lookup table generation. Compared to the existing white-box AES implementation, the lookup table size and the table lookups increase by about 1.5- and 1.6 times, respectively.
Category / Keywords: implementation / White-box cryptography, power analysis, differential computation analysis, countermeasure.
Date: received 22 Mar 2017
Contact author: skwang at etri re kr
Available format(s): PDF | BibTeX Citation
Version: 20170325:202044 (All versions of this report)
Short URL: ia.cr/2017/267
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]