Authors: |
- Guillaume Barbu , IDEMIA, Cryptography & Security Labs, Pessac, France
- Ward Beullens , IBM Research, Zurich, Switzerland
- Emmanuelle Dottax , IDEMIA, Cryptography & Security Labs, Pessac, France
- Christophe Giraud , IDEMIA, Cryptography & Security Labs, Pessac, France
- Agathe Houzelot , IDEMIA, Cryptography & Security Labs, Pessac, France; LaBRI, CNRS, Université de Bordeaux, Bordeaux, France
- Chaoyun Li , imec-COSIC, KU Leuven, Leuven, Belgium
- Mohammad Mahzoun , Eindhoven University of Technology, Eindhoven, Netherlands
- Adrián Ranea , imec-COSIC, KU Leuven, Leuven, Belgium
- Jianrui Xie , imec-COSIC, KU Leuven, Leuven, Belgium
|
Abstract: |
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the state-of-the-art and encourage relevant practical research, inviting developers to submit ECDSA white-box implementations and attackers to break the corresponding submissions.In this work, attackers (team TheRealIdefix) and designers (team zerokey) join to describe several attack techniques and designs used during this contest. We explain the methods used by the team TheRealIdefix, which broke the most challenges, and we show the efficiency of each of these methods against all the submitted implementations. Moreover, we describe the designs of the two winning challenges submitted by the team zerokey; these designs represent the ECDSA signature algorithm by a sequence of systems of low-degree equations, which are obfuscated with affine encodings and extra random variables and equations.The WhibOx contest has shown that securing ECDSA in the white-box model is an open and challenging problem, as no implementation survived more than two days. In this context, our designs provide a starting methodology for further research, and our attacks highlight the weak points future work should address. |