Self-equivalence encodings and improvements of white-box implementations

被引:0
作者
Luo Y. [1 ]
Tong P. [2 ]
Chen J. [1 ,3 ]
Dong X. [3 ]
机构
[1] State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an
[2] School of Cyber Engineering, Xidian University, Xi'an
[3] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2022年 / 49卷 / 02期
关键词
Block cipher; Encoding; SPN cipher; White-box implementation;
D O I
10.19665/j.issn1001-2400.2022.02.017
中图分类号
学科分类号
摘要
In the white box attack environment, the attacker can not only access the input and output of the cryptographic algorithms, but also obtain the internal details of the algorithms and control the terminal. In this environment, CHOW et al. constructed the look-up tables by using network encodings, embedded the key in the look-up tables, and designed the white-box implementation scheme for the AES algorithm and DES algorithm. The white-box implementation of the cryptographic algorithm based on self-equivalent encodings design is a new implementation method. RANEA et al. designed a white-box implementation scheme for substitution replacement cipher by using the self-equivalent encodings of the S-box. The size of encoding space completely depends on the S-box self-equivalence of the cipher, and the security analysis also shows that the application scope of this scheme is limited. In view of this situation, this paper considers the impact of self-equivalence of the S-box on the security of white-box implementation, and proposes two improved schemes for expanding the encoding space of the white-box implementation scheme by adding self-equivalence encodings to the linear layer or linear encodings to the affine layer. Security analysis shows that the two improved schemes can effectively resist the attacks from RANEAet al, and expand the application scope of the scheme. Finally, based on the above two design schemes, this paper constructs two white-box implementations of the AES algorithm, and compares the security with the white-box AES scheme of RANEA et al. The comparison results show that the two improved schemes can resist protocol attacks based on the centralization problem and asymmetric problem. © 2022, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:146 / 154
页数:8
相关论文
共 25 条
  • [1] CHOW S, EISEN P, JOHNSON H, Et al., White-Box Cryptography and an AES Implementation, International Workshop on Selected Areas in Cryptography, pp. 250-270, (2003)
  • [2] XIAO YY, LAI X J., A Secure Implementation of White-Box AES, Proceeding of the 2009 2nd International Conference on Computer Science and Its Applications, (2009)
  • [3] LUO R, LAI X, YOU R., A New Attempt of White-Box AES Implementation, Proceeding 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 423-429, (2014)
  • [4] KARROUMI M., Protecting White-Box AES with Dual Ciphers, International Conference on Information Security and Cryptology, pp. 278-291, (2010)
  • [5] BRINGER J, CHABANNE H, DOTTAX E., White Box Cryptography: Another Attempt (2006)
  • [6] XIAO Y, LAI X J., White-Box Cryptography and Implementation of AES and SMS4, Proceedings of the 2009 China Crypt CACR Annual Meeting, pp. 24-34, (2009)
  • [7] YAO Si, CHEN Jie, A New Method for White-box Implementation of SM4 Algorithm, Journal of Cryptologic Research, 7, 3, pp. 358-374, (2020)
  • [8] BAI K P, WU C K., A Secure White-Box SM4 Implementation, Security and Communication Networks, 9, 10, pp. 996-1006, (2016)
  • [9] SU S, DONG H, FU G, Et al., A White-Box CLEFIA Implementation for Mobile Devices, 2014 Communications Security Conference, (2014)
  • [10] YAO Si, CHEN Jie, GONG Yating, Et al., A New Method for White-Box Implementation of CLEFIA Algorithm, Journal of Xidian University, 47, 5, pp. 150-158, (2020)