[Resource Topic] 2015/753: Differential Computation Analysis: Hiding your White-Box Designs is Not Enough

Welcome to the resource topic for 2015/753

Title:
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough

Authors: Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen

Abstract:

Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell “secure” white-box products. In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort. This differential computation analysis (DCA) attack is the software counterpart of the differential power analysis attack as applied by the cryptographic hardware community. We developed plugins to widely available dynamic binary instrumentation frameworks to produce software execution traces which contain information about the memory addresses being accessed. We show how DCA can extract the secret key from all publicly (non-commercial) available white-box programs implementing standardized cryptography by analyzing these traces to identify secret-key dependent correlations.

ePrint: https://eprint.iacr.org/2015/753

Talk: https://www.youtube.com/watch?v=Zuhapyo7qFQ

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .