Collision-Based Attacks on White-Box Implementations of the AES Block Cipher

被引:0
|
作者
Lu, Jiqiang [1 ,2 ,3 ]
Wang, Mingxue [1 ]
Wang, Can [1 ]
Yang, Chen [4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Beihang Univ, Hangzhou Innovat Inst, Hangzhou, Peoples R China
[4] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
来源
SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022 | 2024年 / 13742卷
关键词
White-box cryptography; Block cipher; AES; Collision attack; CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1007/978-3-031-58411-4_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since Chow et al. introduced white-box cryptography with a white-box implementation of the AES block cipher in 2002, a few attacks and improvements on Chow et al.'s white-box AES implementation have been presented, particularly Lepoint et al. gave a collision-based attack with a time complexity of about 2(22) in 2013. Lepoint et al.'s attack involves three phases at a high level: first defining a collision function to recover a round's keyed S-box transformations each from protected input by a white-box encoding to original output, then recovering the output encoding of this round, and finally recovering the round key bytes of the next round by testing every key candidate under a statistical distinguisher. In this paper, we give two extensions to Lepoint et al.'s collision-based attack, one is by executing Lepoint et al.'s first phase for two consecutive rounds and then recovering the round key of the latter round directly from the two recovered SubBytes outputs of the two rounds, and the other is by executing Lepoint et al.'s first phase for two consecutive rounds, then executing Lepoint et al.'s second phase for the former round and finally recovering the round key of the latter round directly from the recovered keyed S-box transformations of the latter round. Compared with Lepoint et al.'s approach, the two extensions avoid the last one or two phases and the associated prerequisites, and thus they can attack a broader range of white-box implementations, specifically, the first extension targets SPN ciphers, and the second extension targets both SPN and Feistel ciphers. As an example, we apply the first extension to attack Bai et al.'s white-box AES implementation with an expected time complexity of about 2(20) S-box computations. Together with some previous work, our work indicates that all the previously published white-box AES implementations with external encodings are not practically secure, and white-box implementation designers should pay attention to these new collision-based approaches.
引用
收藏
页码:328 / 352
页数:25
相关论文
共 50 条
  • [31] Protecting White-Box Block Ciphers with Galois/Counter Mode
    Xie, Nanjiang
    Gong, Zheng
    Tang, Yufeng
    Wang, Lei
    Wen, Yamin
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [32] FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
    Kwon, Jihoon
    Lee, Byeonghak
    Lee, Jooyoung
    Moon, Dukjae
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 106 - 128
  • [33] Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
    Lee, Seungkwang
    Choi, Dooho
    Choi, Yong-Je
    ETRI JOURNAL, 2015, 37 (05) : 1012 - 1022
  • [34] Study on White-Box Cryptography: Key Whitening and Entropy Attacks
    Bhatia, Kratika
    Som, Subhranil
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 323 - 327
  • [35] Constructing Key Dependent Dynamic S-Box for AES Block Cipher System
    Manjula, G.
    Mohan, H. S.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 613 - 617
  • [36] Self-equivalence encodings and improvements of white-box implementations
    Luo Y.
    Tong P.
    Chen J.
    Dong X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (02): : 146 - 154
  • [37] Efficient collision attacks on smart card implementations of masked AES
    WANG An
    WANG ZongYue
    ZHENG XueXin
    WANG XiaoMei
    CHEN Man
    ZHANG GuoShuang
    WU LiJi
    Science China(Information Sciences), 2015, 58 (05) : 97 - 111
  • [38] Efficient collision attacks on smart card implementations of masked AES
    Wang An
    Wang ZongYue
    Zheng XueXin
    Wang XiaoMei
    Chen Man
    Zhang GuoShuang
    Wu LiJi
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 15
  • [39] Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
    Rodrigues, Felix Carvalho
    Fujii, Hayato
    Zoppi Serpa, Ana Clara
    Sider, Giuliano
    Dahab, Ricardo
    Lopez, Julio
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2019, 2019, 11774 : 341 - 363
  • [40] WBZUC: novel white-box ZUC-128 stream cipher
    Yang Y.
    Zhang R.
    Dong H.
    Ma Y.
    Zhang X.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (02): : 96 - 106