Cryptology ePrint Archive: Report 2017/267
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
Abstract: Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks
because they can be performed without detailed knowledge of the target implementation. The success of the gray-box attack is reportedly due to the unbalanced encoding used to generate the white-box lookup table.
In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to apply the masking technique
before encoding intermediate values during the white-box lookup table generation. Because we do not require any random source in runtime,
it is possible to perform efficient encryption and decryption using our method. The security and performance analysis shows that the proposed method can be a reliable and efficient countermeasure.
Category / Keywords: implementation / White-box cryptography, power analysis, differential computation analysis, countermeasure.
Date: received 22 Mar 2017, last revised 11 Dec 2017
Contact author: skwang at etri re kr
Available format(s): PDF | BibTeX Citation
Version: 20171212:060410 (All versions of this report)
Short URL: ia.cr/2017/267
[ Cryptology ePrint archive ]