Paper 2021/1028
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet, Sylvain Guilley, and Sihem Mesnager
Abstract
In some practical enciphering frameworks, operational constraints may require that a secret key be embedded into the cryptographic algorithm.
Such implementations are referred to as White-Box Cryptography (WBC).
One technique consists of the algorithm's tabulation specialized for its key, followed by obfuscating the resulting tables.
The obfuscation consists of the application of invertible diffusion and confusion layers at the interface between tables
so that the analysis of input/output does not provide exploitable information about the concealed key material.
Several such protections have been proposed in the past and already cryptanalyzed thanks to a complete WBC scheme analysis.
In this article, we study a particular pattern for local protection (which can be leveraged for robust WBC); we formalize it as DIBO (for Diffused-Input-Blocked-Output).
This notion has been explored (albeit without having been nicknamed DIBO) in previous works.
However, we notice that guidelines to adequately select the invertible diffusion
Metadata
- Available format(s)
-
PDF
- Category
- Implementation
- Publication info
- A minor revision of an IACR publication in TCHES 2021
- Keywords
- White-Box CryptographyobfuscationDiffused-Input-Blocked-Output (DIBO)spectral characteristicsnumber of zeros in Walsh spectrummathematical proof of attackrepaired DIBO.
- Contact author(s)
- sylvain guilley @ secure-ic com
- History
- 2021-08-06: received
- Short URL
- https://ia.cr/2021/1028
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1028, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1028}, year = {2021}, url = {https://eprint.iacr.org/2021/1028} }