[Resource Topic] 2016/203: White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels

Welcome to the resource topic for 2016/203

Title:
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels

Authors: Pascal Sasdrich, Amir Moradi, Tim Güneysu

Abstract:

Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-box scenario, however, the property of hiding required implementation details from the attacker could be used as a promising mitigation strategy against side-channel attacks (SCA). In this work, we present a first white-box implementation of AES on reconfigurable hardware for which we evaluate this approach assuming a gray-box attacker. We show that - unfortunately - such an implementation does not provide sufficient protection against an SCA attacker. We continue our evaluations by a thorough analysis of the source of the observed leakage, and present additional results which can be used to build stronger white-box designs.

ePrint: https://eprint.iacr.org/2016/203

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .