You are looking at a specific version 20170325:202044 of this paper. See the latest version.

Paper 2017/267

A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis

Seungkwang Lee

Abstract

Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge of the target implementation. The success of the gray-box attack is due to the unbalanced encoding used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to use Boolean masking before encoding intermediate values during the white-box lookup table generation. Compared to the existing white-box AES implementation, the lookup table size and the table lookups increase by about 1.5- and 1.6 times, respectively.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
White-box cryptographypower analysisdifferential computation analysiscountermeasure.
Contact author(s)
skwang @ etri re kr
History
2017-12-12: last of 3 revisions
2017-03-25: received
See all versions
Short URL
https://ia.cr/2017/267
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.