Overview
Syllabus
Intro
What and why...
Black-Box Security
Gray-Box Security
Sign of the times...
White Box Cryptography
Software in the White Box context
Software Protection
How does WBC work?
WBC Construction: partial evaluation
Example code
External encoding
WBC attack literature
Differential Fault Analysis
DFA computation for DES
Divide and conquer
DFA attack process
Locating the injection point
Fault injection
STEP 3: Analysis
Summary DFA results
Hypothesis testing
Generalization of differential SCA attacks
To our surprise....
SCA attack process
Capture measurement
SCA Analysis
What does it mean?
How to make it stronger?
Taught by
Black Hat