Collision-Based Attacks on White-Box Implementations of the AES Block Cipher

被引:0
|
作者
Lu, Jiqiang [1 ,2 ,3 ]
Wang, Mingxue [1 ]
Wang, Can [1 ]
Yang, Chen [4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Beihang Univ, Hangzhou Innovat Inst, Hangzhou, Peoples R China
[4] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
来源
SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022 | 2024年 / 13742卷
关键词
White-box cryptography; Block cipher; AES; Collision attack; CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1007/978-3-031-58411-4_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since Chow et al. introduced white-box cryptography with a white-box implementation of the AES block cipher in 2002, a few attacks and improvements on Chow et al.'s white-box AES implementation have been presented, particularly Lepoint et al. gave a collision-based attack with a time complexity of about 2(22) in 2013. Lepoint et al.'s attack involves three phases at a high level: first defining a collision function to recover a round's keyed S-box transformations each from protected input by a white-box encoding to original output, then recovering the output encoding of this round, and finally recovering the round key bytes of the next round by testing every key candidate under a statistical distinguisher. In this paper, we give two extensions to Lepoint et al.'s collision-based attack, one is by executing Lepoint et al.'s first phase for two consecutive rounds and then recovering the round key of the latter round directly from the two recovered SubBytes outputs of the two rounds, and the other is by executing Lepoint et al.'s first phase for two consecutive rounds, then executing Lepoint et al.'s second phase for the former round and finally recovering the round key of the latter round directly from the recovered keyed S-box transformations of the latter round. Compared with Lepoint et al.'s approach, the two extensions avoid the last one or two phases and the associated prerequisites, and thus they can attack a broader range of white-box implementations, specifically, the first extension targets SPN ciphers, and the second extension targets both SPN and Feistel ciphers. As an example, we apply the first extension to attack Bai et al.'s white-box AES implementation with an expected time complexity of about 2(20) S-box computations. Together with some previous work, our work indicates that all the previously published white-box AES implementations with external encodings are not practically secure, and white-box implementation designers should pay attention to these new collision-based approaches.
引用
收藏
页码:328 / 352
页数:25
相关论文
共 50 条
  • [21] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [22] LPN-based Attacks in the White-box Setting
    Charlès A.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 318 - 343
  • [23] Implicit White-Box Implementations: White-Boxing ARX Ciphers
    Ranea, Adrian
    Vandersmissen, Joachim
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 33 - 63
  • [24] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [25] Another Look on Bucketing Attack to Defeat White-Box Implementations
    Zeyad, Mohamed
    Maghrebi, Houssem
    Alessio, Davide
    Batteux, Boris
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 99 - 117
  • [26] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [27] Analysis and improvement of differential computation attacks against internally-encoded white-box implementations
    Rivain M.
    Wang J.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 225 - 255
  • [28] Attacking White-Box AES Constructions
    McMillion, Brendan
    Sullivan, Nick
    SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
  • [29] Cryptanalysis of white-box DES implementations with arbitrary external encodings
    Wyseur, Brecht
    Michiels, Wil
    Gorissen, Paul
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 264 - +
  • [30] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143