2018
DOI: 10.1587/transinf.2017edl8186
|View full text |Cite
|
Sign up to set email alerts
|

A White-Box Cryptographic Implementation for Protecting against Power Analysis

Abstract: SUMMARYEncoded lookup tables used in white-box cryptography are known to be vulnerable to power analysis due to the imbalanced encoding. This means that the countermeasures against white-box attacks can not even defend against gray-box attacks. For this reason, those who want to defend against power analysis through the white-box cryptographic implementation need to find other ways. In this paper, we propose a method to defend power analysis without resolving the problematic encoding problem. Compared with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
(16 reference statements)
0
2
0
Order By: Relevance
“…This distinguisher has subsequently been reused in [Lee18,LJK20,Ras20]. This distinguisher considers absolute values (norm-1) and not squares (norm-2) of the Walsh spectrum, since according to the Parseval relation, the sum of squares is independent of the choice of…”
Section: Spectral Distinguisher Of Sasdrich Et Almentioning
confidence: 99%
“…This distinguisher has subsequently been reused in [Lee18,LJK20,Ras20]. This distinguisher considers absolute values (norm-1) and not squares (norm-2) of the Walsh spectrum, since according to the Parseval relation, the sum of squares is independent of the choice of…”
Section: Spectral Distinguisher Of Sasdrich Et Almentioning
confidence: 99%
“…However, masking is vulnerable to higher-order DPA attacks, and this is also the case with masking applied to white-box cryptography [27]. Another method is to use an additional set of lookup tables that store bits completely inverted from a given table set [28]. However, this method is only effective if the given table set shows a high correlation, and thus the protection is not always guaranteed.…”
Section: Past Design Of Masked Wb-aesmentioning
confidence: 99%