Cryptanalysis of White-Box DES Implementations with Arbitrary - - PowerPoint PPT Presentation

cryptanalysis of white box des implementations with
SMART_READER_LITE
LIVE PREVIEW

Cryptanalysis of White-Box DES Implementations with Arbitrary - - PowerPoint PPT Presentation

Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel COSIC K.U.Leuven and Philips Research March 27 2007 White-Box Attack Context key key ke y


slide-1
SLIDE 1

Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings

Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel

COSIC – K.U.Leuven and Philips Research

March 27 2007

slide-2
SLIDE 2

White-Box Attack Context

Software running on host Dynamic execution can be observed Internal details both completely visible and

alterable at will Attacker's goal: extract the embedded secret key

key ke y key

slide-3
SLIDE 3

State-of-the-art

WB DES

Chow et al. 2002

WB AES

Chow et al. 2002

Naked variant Encoded variant

Fault injection attack

Jacob et al. 2002

Statistical attack

Link et al. 2005

Improved variant

Cryptanalysis

Goubin et al. 2007

Cryptanalysis

Wyseur et al. 2007

Cryptanalysis

Billet et al. 2004

Condensed impl.

Wyseur et al. 2005

slide-4
SLIDE 4

White-box transformation

slide-5
SLIDE 5

White-box transformations

Internal encodings

LT 1 LT 2 LT 1 LT 2 Encoding Inv encoding LT' 1 LT' 2

slide-6
SLIDE 6

White-box transformations

External encodings

Protection against

implementation extraction

Protection against first

and last round attacks “Encoded variant”

E/D Input encoding Output encoding

slide-7
SLIDE 7

White-box transformation

slide-8
SLIDE 8

Differential Cryptanalysis

Round 1 Round 2 Round 3 Round 4 Round 16 Input encoding Output encoding Input 12 byte state 12 byte state 12 byte state 12 byte state 12 byte state Output

Difference propagation Difference knowledge S-box input recovery S-box identification Key recovery

slide-9
SLIDE 9

Differential Cryptanalysis

Detect single R-bit flips

Change the input to a T-

box in round 1

Observe difference

propagation at the input

  • f round 3

Observe: 2 different T- boxes affected

slide-10
SLIDE 10

Conclusion

Attack with time complexity: 214 independent

  • f the external encodings

Design choices that make DES “strong” in a

black-box environment, make it weak in a black-box environment

Paper at http://eprint.iacr.org