Abstract
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the state-of-the-art and encourage relevant practical research, inviting developers to submit ECDSA white-box implementations and attackers to break the corresponding submissions. In this work, attackers (team TheRealIdefix) and designers (team zerokey) join to describe several attack techniques and designs used during this contest. We explain the methods used by the team TheRealIdefix, which broke the most challenges, and we show the efficiency of each of these methods against all the submitted implementations. Moreover, we describe the designs of the two winning challenges submitted by the team zerokey; these designs represent the ECDSA signature algorithm by a sequence of systems of low-degree equations, which are obfuscated with affine encodings and extra random variables and equations. The WhibOx contest has shown that securing ECDSA in the white-box model is an open and challenging problem, as no implementation survived more than two days. In this context, our designs provide a starting methodology for further research, and our attacks highlight the weak points future work should address.
Original language | English |
---|---|
Pages (from-to) | 527-552 |
Number of pages | 26 |
Journal | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volume | 2022 |
Issue number | 4 |
DOIs | |
Publication status | Published - 31 Aug 2022 |
Bibliographical note
Funding Information:The authors would like to thank the other members of the TheRealIdefix team: Yannick Bequer, Luk Bettale, Laurent Castelnovi, Thomas Chabrier, Nicolas Debande, Roch Lescuyer, Sarah Lopez and Nathan Reboud. Adrián Ranea is supported by a PhD Fellowship from the Research Foundation – Flanders (FWO) under grant No. 11E1921N. Chaoyun Li is an FWO post-doctoral fellow under grant No. 1283121N. Ward Beullens is an FWO post-doctoral fellow under grant No. 1S95620N.
Funding
The authors would like to thank the other members of the TheRealIdefix team: Yannick Bequer, Luk Bettale, Laurent Castelnovi, Thomas Chabrier, Nicolas Debande, Roch Lescuyer, Sarah Lopez and Nathan Reboud. Adrián Ranea is supported by a PhD Fellowship from the Research Foundation – Flanders (FWO) under grant No. 11E1921N. Chaoyun Li is an FWO post-doctoral fellow under grant No. 1283121N. Ward Beullens is an FWO post-doctoral fellow under grant No. 1S95620N.
Funders | Funder number |
---|---|
Fonds Wetenschappelijk Onderzoek | 11E1921N, 1283121N, 1S95620N |
Keywords
- ECDSA
- WhibOx Contest
- White-Box Cryptography