2021
DOI: 10.1049/ise2.12045
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a white‐box SM4 implementation based on collision attack

Abstract: White‐box cryptography is to primarily protect the key of a cipher from being extracted in a white‐box scenario, where an adversary has full access to the execution environment of software implementation. Since the introduction of white‐box cryptography, a number of white‐box implementations of the Chinese SM4 block cipher standard have been proposed, and all of them have been attacked based on Billet et al.’s attack. In this study, we show that collision‐based attack can work more efficiently on Shi et al.’s … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Although it is not an optimized implementation, there is also a study of side-channel attacks on SM4 block cipher. In [29] tried collision-based attack, however it has more efficiently attack then [30]. The main ideas of [29], first they combined the look-up tables T-boxes.…”
Section: E Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although it is not an optimized implementation, there is also a study of side-channel attacks on SM4 block cipher. In [29] tried collision-based attack, however it has more efficiently attack then [30]. The main ideas of [29], first they combined the look-up tables T-boxes.…”
Section: E Related Workmentioning
confidence: 99%
“…In [29] tried collision-based attack, however it has more efficiently attack then [30]. The main ideas of [29], first they combined the look-up tables T-boxes. Second, to remove the effect of dual cipher, it shuffled the order of data in the T-boxes.…”
Section: E Related Workmentioning
confidence: 99%
“…It includes time [3], power consumption [4][5][6], electromagnetic energy [7,8], and some other ones. After that, many effective methods have been proposed along with the development of SCA, such as correlation power analysis (CPA) [9], template attack [10], collision attack [11], mutual information analysis [12], and other methods. Among them, CPA is one of the most commonly used attack methods in SCA [13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Over the past two decades, dozens of white-box implementations of the existing block ciphers have been proposed [1][2][3][4][5]. However, their security was penetrated severely [6][7][8][9][10][11][12]. In recent years, dedicated white-box block ciphers appeared as a promising direction in white-box cryptography.…”
Section: Introductionmentioning
confidence: 99%