ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
44 Downloads (Pure)

Abstract

Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the state-of-the-art and encourage relevant practical research, inviting developers to submit ECDSA white-box implementations and attackers to break the corresponding submissions. In this work, attackers (team TheRealIdefix) and designers (team zerokey) join to describe several attack techniques and designs used during this contest. We explain the methods used by the team TheRealIdefix, which broke the most challenges, and we show the efficiency of each of these methods against all the submitted implementations. Moreover, we describe the designs of the two winning challenges submitted by the team zerokey; these designs represent the ECDSA signature algorithm by a sequence of systems of low-degree equations, which are obfuscated with affine encodings and extra random variables and equations. The WhibOx contest has shown that securing ECDSA in the white-box model is an open and challenging problem, as no implementation survived more than two days. In this context, our designs provide a starting methodology for further research, and our attacks highlight the weak points future work should address.

Original languageEnglish
Pages (from-to)527-552
Number of pages26
JournalIACR Transactions on Cryptographic Hardware and Embedded Systems
Volume2022
Issue number4
DOIs
Publication statusPublished - 31 Aug 2022

Bibliographical note

Funding Information:
The authors would like to thank the other members of the TheRealIdefix team: Yannick Bequer, Luk Bettale, Laurent Castelnovi, Thomas Chabrier, Nicolas Debande, Roch Lescuyer, Sarah Lopez and Nathan Reboud. Adrián Ranea is supported by a PhD Fellowship from the Research Foundation – Flanders (FWO) under grant No. 11E1921N. Chaoyun Li is an FWO post-doctoral fellow under grant No. 1283121N. Ward Beullens is an FWO post-doctoral fellow under grant No. 1S95620N.

Funding

The authors would like to thank the other members of the TheRealIdefix team: Yannick Bequer, Luk Bettale, Laurent Castelnovi, Thomas Chabrier, Nicolas Debande, Roch Lescuyer, Sarah Lopez and Nathan Reboud. Adrián Ranea is supported by a PhD Fellowship from the Research Foundation – Flanders (FWO) under grant No. 11E1921N. Chaoyun Li is an FWO post-doctoral fellow under grant No. 1283121N. Ward Beullens is an FWO post-doctoral fellow under grant No. 1S95620N.

FundersFunder number
Fonds Wetenschappelijk Onderzoek11E1921N, 1283121N, 1S95620N

    Keywords

    • ECDSA
    • WhibOx Contest
    • White-Box Cryptography

    Fingerprint

    Dive into the research topics of 'ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge'. Together they form a unique fingerprint.

    Cite this