2016
DOI: 10.1007/978-3-662-52993-5_10
|View full text |Cite
|
Sign up to set email alerts
|

White-Box Cryptography in the Gray Box

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Recent work in this direction has shed more light on the success of the gray-box approach outlined above, and studied more closely the effect of affine and non-linear encodings on the resistance of a white-box implementation against side-channel attacks [SMG16,BBMT18]. These works show that 4-bit non-linear encodings, which were recommended in the original scheme by Chow et al for size reasons, are insecure in that context.…”
Section: Related Workmentioning
confidence: 99%
“…Recent work in this direction has shed more light on the success of the gray-box approach outlined above, and studied more closely the effect of affine and non-linear encodings on the resistance of a white-box implementation against side-channel attacks [SMG16,BBMT18]. These works show that 4-bit non-linear encodings, which were recommended in the original scheme by Chow et al for size reasons, are insecure in that context.…”
Section: Related Workmentioning
confidence: 99%
“…However, it was found that there was a correlation between the encoded value and the non-encoded value due to the imbalanced encoding applied to the lookup table generation in the white-box implementation. Thus, the gray-box attack succeeded [3], [4]. Thus, white-box cryptography is vulnerable to not only algebraic analysis, but also gray-box attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Although the encoding randomizes the Hamming weight of the intermediate values, it is known to be imbalanced [4], and thus leads to a bit-to-bit correlation before and after the encoding. This imbalance makes it possible to perform power analysis including Differential Power Analysis (DPA) [5] or Correlation Power Analysis (CPA) [6] based on the mono-bit model.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack is called differential computation analysis (DCA). Sasdrich et al [30] pointed out that the weakness against the DCA attack can be explained using the Walsh transform of the encoding functions. Banik et al [1] analyzed software countermeasures against the DCA attack and proposed another automated attack called Zero Difference Enumeration attack.…”
Section: Introductionmentioning
confidence: 99%