2019
DOI: 10.1007/978-3-030-16350-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Another Look on Bucketing Attack to Defeat White-Box Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Extended statistical bucketing analysis [22], as a variant of the collision attack, is based on the fact that if two correct hypothetical values computed by a pair of plaintexts do not collide, their corresponding encoded values should not collide as well. Bucketing Computational Analysis (BCA) applied this principle to white-box cryptography using computation traces.…”
Section: Bucketing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Extended statistical bucketing analysis [22], as a variant of the collision attack, is based on the fact that if two correct hypothetical values computed by a pair of plaintexts do not collide, their corresponding encoded values should not collide as well. Bucketing Computational Analysis (BCA) applied this principle to white-box cryptography using computation traces.…”
Section: Bucketing Attackmentioning
confidence: 99%
“…A collision-based DCA attack [21] is similar to the 2-byte key guess, but the analysis method of computation traces is different. A bucketing attack [22], as a collision attack, can be also successful with chosen-plaintext sets, in which the plaintexts are divided into two set based on the predefined four bits of a hypothetical round output. The common cause of these vulnerabilities is that an attacker who correctly guessed one or two subkeys can predict the input value to the encoding of a round output using a set of subbytes in the plaintext.…”
Section: Introductionmentioning
confidence: 99%
“…At CHES 2019, Rivain and Wang [RW19] proposed collision attack (CA) and mutual information analysis (MIA) as the variants of DCA. Zeyad et al [ZMAB19] proposed the bucketing computational analysis (BCA) to attack white-box implementations. Similar to ZDE, BCA sorts the computation traces based on key-dependent intermediate values.…”
Section: Introductionmentioning
confidence: 99%