The WhibOx contest is back for a 4th edition, continuing the last edition's focus on public-key white-box cryptography.

You think you can obfuscate an ECDSA signature implementation and make its secret key hard to extract? You'd like to break white-box ECDSA candidates? This challenge is made for you!

The WhibOx contest, Edition 2024, is a white-box cryptography competition organized as one of the CHES 2024 challenges. The contest will take place from late May to early September 2024.

As previous editions, the competition challenges two categories of competitors:

  • Coders are invited to post candidate white-box implementations computing an ECDSA signature (on the NIST P256 curve) from input message digest under a freely chosen secret key. The signature algorithm can be non-deterministic or deterministic with a freely chosen nonce derivation mechanism. Candidate implementations are expected to resist key extraction when submitted to white-box attackers.
  • Attackers are invited to break the submitted implementations i.e. extract their hard-coded signing key.

Contestants are free to remain anonymous. Coders are not expected to explain their designs, but only to provide a C source code of the white-box implementation. Attackers are not expected to explain their techniques, but only to recover embedded key(s).


Wall of Fame

Final strawberry scoreboard (developer category)

# Pseudonym Identities Score Prize
1 Idefix Cryptography & Security team of IDEMIA 224.03 $600
2 ἀναμάρτητος Jan Geuenich, Dominik Klein, Friederike Laus, Johannes Mittmann, Jan Simmer
Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany
Aron Gohr
(independent researcher)
160.15 $300
3 bluecat Nicolas Tranchant 26.78 $100
4 sffoh_kcrek anonymous 25.76
5 dowejfreglei234 anonymous 18.81
6 Win95 anonymous 2.02
7 mcarter anonymous 0.84
8 chouloco Matthias Chouteau
École polytechnique, France
0.02
9 nxmq anonymous 0.01
10 Second anonymous 0.0009

Final banana scoreboard (attacker category)

# Pseudonym Identities Score Total Breaks Prize
1 kerckhoffs Jan Geuenich, Dominik Klein, Friederike Laus, Johannes Mittmann, Jan Simmer
Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany
Aron Gohr
(independent researcher)
224.03 46 $600
2 Idefix Cryptography & Security team of IDEMIA 160.15 32 $300
3 BlackBox Hermann Drexler, Lars Hoffmann
Giesecke + Devrient, Munich
48.39 38 $100
4 rod anonymous 17.24 19
5 bluecat Nicolas Tranchant 2.02 14
6 BugsBunny anonymous 0.009 12
7 Malcolm Carter anonymous 0.0007 1
8 jibe anonymous 0.0004 13

Challenge schedule

Submission Open May 26, 2024 @ 23:59 AoE
Submission deadline August 8, 2024 @ 23:59 AoE
Attack deadline September 1, 2024 @ 23:59 AoE
Winners Announcement CHES 2024 rump session (September 6, 2024)

As soon as a challenge implementation is submitted and verified, it is made public on the server and can hence be freely downloaded and broken by contestants. Implementations can be submitted from May 26 to Aug 8, 2024. After the submission deadline, attackers still have more than 3 weeks to continue breaking challenge implementations (until two days before CHES 2024 starts).

Winners will be announced at the CHES 2024 rump session.


Challenge rules

The detailed rules of the challenge can be found on this page.

Following questions on the slack channel regarding multiple accounts for submitting and attacking challenges, we provide the following addenda to the rules for clarification:

  • Designers are not allowed to break their own challenges.

  • More generally: it is forbidden for a team of attackers to break the challenge of a team of designers if there exists a non empty intersection between the two teams (i.e. at least one individual common to the two teams).

  • Any team publicly breaching the above rule will be disqualified.

  • One individual cannot be twice on the designer wall of fame (or podium) by being part of two different teams.

  • One individual cannot be twice on the attacker wall of fame (or podium) by being part of two different teams.

  • It is perfectly allowed to use different accounts for attacking and designing. Also, different accounts can be used in the same category but a single one will be accounted on the wall of fame, in accordance to the above points.


Cash prize

The winners of the challenge will be awarded with fame and a total of 2000$ cash prize. The 2000$ cash prize will be shared between the winners, as follows:

  • Designers’ podium:

    • 600 for the strawberry winner

    • 300 for the second highest strawberry score

    • 100 for the third highest strawberry score

  • Attackers’ podium:

    • 600 for the banana winner

    • 300 for the second highest banana score

    • 100 for the third highest banana score


Connect with the community

Stay tunned our official Twitter account @WhiboxC.

Join the discussion forum on Slack and get your questions answered by the organizing committee. Send us an invitation request at whibox.organizing.committee@gmail.com. You may also be invited by people that are already members.

The organizing committee is composed of Louis Goubin (UVSQ), Ryad Benadjila, Pascal Paillier, Matthieu Rivain (CryptoExperts), Alex Biryukov, Aleksei Udovenko (University of Luxembourg), and Junwei Wang.


Credits

This competition is one of the challenges of CHES 2024, a conference sponsored by IACR.

The source code of the submission server has been developed by CryptoExperts. It is fully open source and available on GitHub. The server of this edition is administrated and maintained by CryptoExperts.

Credits go to Ryad Benadjila for re-developing parts of the server at the occasion of this fourth edition of the WhibOx contest; the previous versions were created and upgraded by Thomas Baignères, Matthieu Finiasz and Junwei Wang.