On the Linear Transformation in White-Box Cryptography

A linear transformation is applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is no...

Full description

Bibliographic Details
Main Authors: Seungkwang Lee, Nam-Su Jho, Myungchul Kim
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9035436/
id doaj-433396bfa6f348439eab283288270bde
record_format Article
spelling doaj-433396bfa6f348439eab283288270bde2021-03-30T02:11:12ZengIEEEIEEE Access2169-35362020-01-018516845169110.1109/ACCESS.2020.29805949035436On the Linear Transformation in White-Box CryptographySeungkwang Lee0https://orcid.org/0000-0001-9534-9624Nam-Su Jho1https://orcid.org/0000-0003-1721-5350Myungchul Kim2Department of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South KoreaCryptographic Engineering Research Section, Electronics and Telecommunications Research Institute (ETRI), Daejeon, South KoreaDepartment of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South KoreaA linear transformation is applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is not enough to protect the key against statistical analysis. So far, the Hamming weight of rows in the invertible matrix has been considered the main cause of the key leakage from the linear transformation. In this study, we present an in-depth analysis of the distribution of intermediate values and the characteristics of block invertible binary matrices. Our mathematical analysis and experimental results show that the balanced distribution of the key-dependent intermediate value is the main cause of the key leakage.https://ieeexplore.ieee.org/document/9035436/White-box cryptographylinear transformationkey leakage
collection DOAJ
language English
format Article
sources DOAJ
author Seungkwang Lee
Nam-Su Jho
Myungchul Kim
spellingShingle Seungkwang Lee
Nam-Su Jho
Myungchul Kim
On the Linear Transformation in White-Box Cryptography
IEEE Access
White-box cryptography
linear transformation
key leakage
author_facet Seungkwang Lee
Nam-Su Jho
Myungchul Kim
author_sort Seungkwang Lee
title On the Linear Transformation in White-Box Cryptography
title_short On the Linear Transformation in White-Box Cryptography
title_full On the Linear Transformation in White-Box Cryptography
title_fullStr On the Linear Transformation in White-Box Cryptography
title_full_unstemmed On the Linear Transformation in White-Box Cryptography
title_sort on the linear transformation in white-box cryptography
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description A linear transformation is applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is not enough to protect the key against statistical analysis. So far, the Hamming weight of rows in the invertible matrix has been considered the main cause of the key leakage from the linear transformation. In this study, we present an in-depth analysis of the distribution of intermediate values and the characteristics of block invertible binary matrices. Our mathematical analysis and experimental results show that the balanced distribution of the key-dependent intermediate value is the main cause of the key leakage.
topic White-box cryptography
linear transformation
key leakage
url https://ieeexplore.ieee.org/document/9035436/
work_keys_str_mv AT seungkwanglee onthelineartransformationinwhiteboxcryptography
AT namsujho onthelineartransformationinwhiteboxcryptography
AT myungchulkim onthelineartransformationinwhiteboxcryptography
_version_ 1724185616453730304