### Analysis of Software Countermeasures for Whitebox Encryption

Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, and Martin Bjerregaard Jepsen

##### Abstract

Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model where the adversary has full access to the execution environment. To attain security in this setting is a challenging problem: Indeed, all published whitebox implementations of standard symmetric-key algorithms such as AES to date have been practically broken. However, as far as we know, no whitebox implementation in real-world products has suffered from a key recovery attack. This is due to the fact that commercial products deploy additional software protection mechanisms on top of the whitebox implementation. This makes practical attacks much less feasible in real-world applications. There are numerous software protection mechanisms which protect against standard whitebox attacks. One such technique is control flow obfuscation which randomizes the order of table lookups for each execution of the whitebox encryption module. Another technique is randomizing the locations of the various Look up tables (LUTs) in the memory address space. In this paper we investigate the effectiveness of these countermeasures against two attack paradigms. The first known as Differential Computational Analysis (DCA) attack was developed by Bos, Hubain, Michiels and Teuwen in CHES 2016. The attack passively collects software execution traces for several plaintext encryptions and uses the collected data to perform an analysis similar to the well known differential power attacks (DPA) to recover the secret key. Since the software execution traces contain time demarcated physical addresses of memory locations being read/written into, they essentially leak the values of the inputs to the various LUTs accessed during the whitebox encryption operation, which as it turns out leaks sufficient information to perform the power attack. We found that if in addition to control flow obfuscation, one were to randomize the locations of the LUTs in the memory, then it is very difficult to perform the DCA on the resultant system using such table inputs and extract the secret key in reasonable time. As an alternative, we investigate the version of the DCA attack which uses the outputs of the tables instead of the inputs to mount the power analysis attack. This modified DCA is able to extract the secret key from the flow obfuscated and location randomized versions of several whitebox binaries available in crypto literature. We develop another attack called the Zero Difference Enumeration (ZDE) attack. The attack records software traces for several pairs of strategically selected plaintexts and performs a simple statistical test on the effective difference of the traces to extract the secret key. We show that ZDE is able to recover the keys of whitebox systems. Finally we propose a new countermeasure for protecting whitebox binaries based on insertion of random delays which aims to make both the ZDE and DCA attacks practically difficult by adding random noise in the information leaked to the attacker.

##### Metadata
Available format(s)
Publication info
Published by the IACR in TOSC 2017
Keywords
Differential Computation Analysis AttackWhitebox CryptographyZero Difference Enumeration
Contact author(s)
bsubhadeep @ ntu edu sg
anbog @ dtu dk
takanori isobe1 @ gmail com
martin @ jepsen no
History
2017-02-27: received
Short URL
https://ia.cr/2017/183
License

CC BY

BibTeX

@misc{cryptoeprint:2017/183,
author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen},
title = {Analysis of Software Countermeasures for Whitebox Encryption},
howpublished = {Cryptology ePrint Archive, Paper 2017/183},
year = {2017},
note = {\url{https://eprint.iacr.org/2017/183}},
url = {https://eprint.iacr.org/2017/183}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.