Hardened white box implementation 1
10438513 · 2019-10-08
Assignee
Inventors
Cpc classification
G09C1/06
PHYSICS
G09C1/00
PHYSICS
H04L9/0618
ELECTRICITY
H04L9/0631
ELECTRICITY
H04L9/002
ELECTRICITY
International classification
G09C1/06
PHYSICS
H04L9/06
ELECTRICITY
H04L9/08
ELECTRICITY
G09C1/00
PHYSICS
Abstract
The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.
Claims
1. A processor device comprising: one or more processors, wherein the one or more processors has an executable white-box-masked implementation of a cryptographic algorithm implemented thereon, which is configured to generate an output text, from an input text while employing a secret key K, wherein the implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T by means of an invertible function f; wherein the invertible function f comprises an affine mapping A applied to the computation step S, said mapping being configured to generate output values w from A by applying A to output values s of the computation step S and additionally to one or several obfuscation values y which are statistically independent of the output values s of the computation step S, so that it holds that w=A(S[x], y)=A(s, y); and wherein the affine mapping A is further so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.
2. The processor device according to claim 1, wherein the affine mapping A comprises a linear mapping which is formed by a matrix MA, which is organized in columns and rows, wherein the output values s of the computation step S and the statistically independent obfuscation values y are associated with separate columns in the matrix MA.
3. The processor device according to claim 2, wherein in each row of the matrix MA in at least one of the columns having statistically independent values y there is contained a non-zero value.
4. The processor device according to claim 1, wherein for carrying out the implementation of the white-box-masked computation step T there has been supplied a look-up table STab[x] representing the computation step S, or a look-up table STab[x,y] representing the computation step S and the obfuscation values y.
5. The processor device according to claim 1, wherein the white-box-masked computation step T is represented by a white-box-masked look-up table TTab [x, y] in which values f(s, y) are entered.
6. The processor device according to claim 1, wherein the implementation additionally comprises a further invertible function g to be applied to input values x of the computation step S, or to input values x of the computation step S and to obfuscation values y according to g.sup.1(x) or g.sup.1(x, y).
7. The processor device according to claim 1, wherein there is provided as an algorithm a block cipher having several rounds, and as a computation step S: one or several SBox operations or one or several inverse SBox operations, of one round in each case; or a combination of one or several SBox operations or one or several inverse SBox operations, of respectively one round, with one or several further operations of the round.
8. The processor device according to claim 7 having algorithm DES, wherein there is/are provided as an input value x either one or several expanded right entry bits ri ( r1 |r2|. . . ) of a round, or a linkage (x=r1 XOR k1|r2 XOR k2 |. . . ) of one or several expanded right entry bits ri of a round with one or several key bits ki; or/and one or several left entry bits li of the round go into the obfuscation values y.
9. The processor device according to claim 7 having algorithm DES, wherein the obfuscation values y are computed by means of a function V from one or several left entry bits li of the round or/and from one or several expanded right entry bits ri of the round, wherein V is electively a linear mapping or a hash function.
10. The processor device according to claim 9, wherein the algorithm has several rounds and the function V is newly chosen for every round.
11. The processor device according to claim 7, having algorithm DES, wherein the further operations comprise one or several of the following: permutation P; expansion E; addition of left and right entry bits 1, r or left and expanded right entry bits 1, r.
12. The processor device according to claim 7 having algorithm AES, wherein there is provided as an input value x an input value or part of an input value of an AddRoundKey operation or a SubBytes operation or an inverse SubBytes operation of an AES round.
13. The processor device according to claim 7 having algorithm AES, wherein the further operations comprise one or several of the following: MixColumn operation or one or several substeps of the MixColumn operation or inverse MixColumn operation or one or several substeps of the inverse MixColumn operation.
14. The processor device according to claim 1, wherein the obfuscation values y are computed respectively by means of a function V from bits of the input text, wherein V is electively a linear mapping or a hash function.
15. The processor device according to claim 14, wherein the algorithm has several rounds and the function V is newly chosen for every round.
16. The processor device according to claim 1, wherein the obfuscation values y further comprise one or several random values y[x], which are added to at least one or all of the output values s of the computation step S, wherein the random values y[x] are first selected randomly and thereupon altered in such a way that y[x] and s are statistically independent.
17. The processor device according to claim 1, wherein the computation step S has been implemented on the processor device as a white-box-masked computation step T in that: (i) the computation step S has been carried out to generate output values s, and (ii) the invertible function f has been applied to the generated output values s of the computation step S and the obfuscation values y, and a thereby achieved result T has been implemented on the processor device.
18. A method of executing a white-box-masked implementation of a cryptographic algorithm implemented on a processor device, which is configured to generate an output text, from an input text while employing a secret key K, the method comprising: implementing a computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T by an invertible function f, wherein the invertible function f includes an affine mapping A applied to the computation step S, said mapping being configured to generate output values w from A by applying A to output values s of the computation step S and additionally to one or several obfuscation values y which are statistically independent of the output values s of the computation step S, so that it holds that w=A(S[x], y)=A(s, y); and wherein the affine mapping A is further so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y such that the output values w of the affine mapping A are statistically balanced.
19. One or more non-transitory computer-readable mediums having stored thereon executable instructions that when executed by the one or more processors of a processor device configure the processor device to perform a method of executing a white-box-masked implementation of a cryptographic algorithm implemented on the processor device, which is configured to generate an output text, from an input text while employing a secret key K, comprising: implementing a computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T by an invertible function f, wherein the invertible function f includes an affine mapping A applied to the computation step S, said mapping being configured to generate output values w from A by applying A to output values s of the computation step S and additionally to one or several obfuscation values y which are statistically independent of the output values s of the computation step S, so that it holds that w=A(S[x], y)=A(s, y); and wherein the affine mapping A is further so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y such that the output values w of the affine mapping A are statistically balanced.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Hereinafter the invention will be explained more closely on the basis of exemplary embodiments and with reference to the drawings, in which are shown:
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION OF EMBODIMENT EXAMPLES
(6)
(7) According to the invention, and as represented in
(8) Hereinafter there is set forth by means of
(9)
(10)
(11) As represented in
(12) In the embodiment of
(13) The matrix MA is multiplied by the entry vector (s,y), which comprises S-box exit values s=S[x] (e.g. bits r of the right side) and obfuscation values y (e.g. bits of the left side), to generate an exit vector w. The sum formula in
(14) The matrix MA is so constructed according to the invention that the effect is achieved that the right sum of the sum equation for i (note: i designates individual bits of w
(15)
disappears for no row index i, i=0, . . . l1. This effect is attained by the fact that in every row i, at least one of the coefficients ai, n+j, j=0, . . . m1, which are to be multiplied with the obfuscation values y=yj, j=0, . . . m1, is non-zero. Through the effect it is ensured that in no row i, i=0, . . . l1 the obfuscation values y in the output vector w disappear, thus in every row i in the record wi of the output vector w at least one obfuscation value yj is contained. This in turn has the further-reaching effect that the output values w of the affine mapping A are statistically balanced.
Glossary
(16) General:
(17) S: computation step, in particular DES SBOX or eight DES S-boxes, in particular for standard representation of DES
(18) T: operation comprising computation step S, for alternative DES representation
(19) T: white-box-obfuscated computation step S, having S embedded in T where applicable
(20) x: input value in computation step S (or T)
(21) y: obfuscation value
(22) r: expanded right side of the input of a round
(23) k: key
(24) s: output value of S (e.g. S-box)
(25) w: output value of T(masked S)
(26) If S=DES S-box or eight DES S-boxes:
(27) x=r XOR k for standard representation of DES
(28) x=r for alternative representation of DES
(29) l=bits from left side of the bits at the DES round-entry (32 bit)
(30) r=bits from right side of the bits at the DES round-entry (32 bit)
(31) r=bits from expanded right side r at the DES round-entry (48 bit)
CITED PRIOR ART
(32) [1] A Tutorial on White-box AES, James A. Muir, Cryptology ePrint Archive, Report 2013/104, eprint.iacr.org/2013/104
(33) [2] DE 102014016548.5 (submitted on 10 Nov. 2014)
(34) [3] Differential Computation Analysis: Hiding your White-Box Designs is Not Enough, J. W. Bos, Ch. Hubain, W. Michiels, and Ph. Teuwen, eprint.iacr.org/2015/753, retrieved on 31 Jul. 2015