Hybrid Code Lifting on Space-Hard Block Ciphers

Application to Yoroi and SPNbox

Authors

  • Yosuke Todo NTT Social Informatics Laboratories, Tokyo, Japan
  • Takanori Isobe University of Hyogo, Kobe, Japan

DOI:

https://doi.org/10.46586/tosc.v2022.i3.368-402

Keywords:

Whitebox cryptography, Space-hard block cipher, Code lifting, Blackbox analysis, Truncated differential, Secret S-box recovery, Longevity

Abstract

There is a high demand for whitebox cryptography from the practical use of encryption in untrusted environments. It has been actively discussed for two decades since Chow et al. presented the whitebox implementation of DES and AES. The goal is to resist the key extraction from the encryption program and mitigate the code lifting of the program. At CCS2015, Bogdanov and Isobe proposed space-hard block ciphers as a dedicated design of whitebox block ciphers. It ensures that the key extraction is as difficult as the key recovery in the standard blackbox model. Moreover, to mitigate code lifting, they introduce space hardness, a kind of leakage-resilient security with the incompressibility of a huge program. For space-hard ciphers, code lifting (a partial leakage of the entire program) is useless to copy the functionality.
In this paper, we consider a new attack model of space-hard block ciphers called hybrid code lifting. Space-hard block ciphers are intended to ensure security under a size-bounded leakage. However, they do not consider attackers (in the standard blackbox model) receiving the leakage by code lifting. If such attackers can recover the encryption program of a space-hard block cipher, such a cipher does not always satisfy the intention. We analyze Yoroi proposed in TCHES 2021. We introduce the canonical representation of Yoroi. Using the representation enables the recovery of the programs of Yoroi-16 and Yoroi-32 with 233 and 265.6 complexities, respectively, in spite of slight leakage. The canonical representation causes another attack against Yoroi. It breaks an authors’ security claim about the “longevity”. We additionally analyzed SPNbox proposed in Asiacrypt 2016. As a result, considering security on the hybrid code lifting, the original number of rounds is insufficient to achieve 128-bit security under quarter-size leakage.

Downloads

Published

2022-09-09

How to Cite

Todo, Y., & Isobe, T. (2022). Hybrid Code Lifting on Space-Hard Block Ciphers: Application to Yoroi and SPNbox. IACR Transactions on Symmetric Cryptology, 2022(3), 368–402. https://doi.org/10.46586/tosc.v2022.i3.368-402

Issue

Section

Articles