Attacks Against White-Box ECDSA and Discussion of Countermeasures

A Report on the WhibOx Contest 2021

Authors

  • Sven Bauer Giesecke+Devrient Mobile Security GmbH, Munich, Germany
  • Hermann Drexler Giesecke+Devrient Mobile Security GmbH, Munich, Germany
  • Max Gebhardt Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany
  • Dominik Klein Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany
  • Friederike Laus Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany
  • Johannes Mittmann Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany

DOI:

https://doi.org/10.46586/tches.v2022.i4.25-55

Keywords:

White-box cryptography, Deterministic ECDSA, Computation analysis, Fault analysis, Countermeasures, CHES Challenge, WhibOx Contest 2021

Abstract

This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations. In particular, we provide a systematic overview of various fault attacks, to which ECDSA white-box implementations are especially susceptible. Then, we propose different mathematical countermeasures, mainly based on masking/blinding of sensitive variables, in order to prevent or at least make such attacks more difficult. We also briefly mention some typical implementational countermeasures and their challenges in the ECDSA white-box scenario. Our work has been initiated by the CHES challenge WhibOx Contest 2021, which consisted of designing and breaking white-box ECDSA implementations, so called challenges. We illustrate our results and findings by means of the submitted challenges and provide a comprehensive overview which challenge could be solved in which way. Furthermore, we analyze selected challenges in more details.

Downloads

Published

2022-08-31

Issue

Section

Articles

How to Cite

Attacks Against White-Box ECDSA and Discussion of Countermeasures: A Report on the WhibOx Contest 2021. (2022). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(4), 25-55. https://doi.org/10.46586/tches.v2022.i4.25-55