Transactions on Cryptographic Hardware and Embedded Systems, Volume 2024
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications
Yufeng Tang
School of Computer Science, South China Normal University, Guangzhou, China
Zheng Gong
School of Computer Science, South China Normal University, Guangzhou, China
Liangju Zhao
School of Computer Science, South China Normal University, Guangzhou, China
Di Li
School of Computer Science, South China Normal University, Guangzhou, China
Zhe Liu
Zhejiang Lab, Hangzhou, China
Keywords: White-box implementation, Self-equivalence encoding, Implicit function, Differential computation analysis, Algebraic degree computation analysis
Abstract
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers. Unfortunately, these two types of white-box implementations are proven to be insecure under the algebraic attack. Different from algebraic attacks, computation analysis can extract the secret key from the memory access traces without software reverse engineering. It is still an open problem whether the self-equivalence and implicit implementations can resist the computation analysis. In this paper, we analyze the encoded structure of the self-equivalence/implicit whitebox ARX ciphers and discuss its resistance to the computation analysis, such as differential computation analysis (DCA) and algebraic degree computation analysis (ADCA). The results reveal that the large input, encoding, and round key can practically mitigate DCA and ADCA. To deal with the large space, we introduce a new method which is named chosen-plaintext computation analysis (CP-CA). Based on a partial key guess and deliberately chosen intermediate value, CP-CA constructs a reverse function to calculate a set of plaintexts. With the obtained plaintexts, the large affine and non-linear encodings will be reduced to a small space. Subsequently, CP-CA mounts the computation analysis on the traces to recover the secret key. Following CP-CA, we propose a CP-DCA attack and reformulate ADCA as chosen-plaintext linear encoding analysis (CP-LEA). The experimental results indicate that the selfequivalence white-box SPECK32/48/64/96/128 and implicit white-box SPECK32/64 implementations are vulnerable to CP-DCA and CP-LEA attacks.
Publication
Transactions of Cryptographic Hardware and Embedded Systems, Volume 2024, Issue 3
PaperArtifact
Artifact number
tches/2024/a21
Artifact published
August 15, 2024
Badge
✅ IACR CHES Artifacts Available
BibTeX How to cite
Yufeng Tang, Zheng Gong, Liangju Zhao, Di Li, Zhe Liu. Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications. (2024). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(3), 634-670. https://doi.org/10.46586/tches.v2024.i3.634-670 Artifact available at https://artifacts.iacr.org/tches/2024/a21