A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents

被引:0
作者
Jin, Chao [1 ]
Bao, Zhejing [1 ]
Miao, Weiwei [2 ]
Zeng, Zeng [2 ]
Wei, Xiaogang [3 ]
Zhang, Rui [2 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou 310027, Peoples R China
[2] State Grid Jiangsu Elect Power Co, Informat & Telecommun Branch, Nanjing 210024, Peoples R China
[3] Nari Grp Corp, State Grid Elect Power Res Inst, Nanjing 210003, Peoples R China
关键词
Edge Internet of Things (IoT) agents; lookup table; SM4; white-box cryptography; CRYPTANALYSIS; AES;
D O I
10.1109/ACCESS.2023.3290211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The white-box implementation of cryptography algorithm can hide key information even in the white-box attack context owing to the means of obfuscation. However, under the deliberately designed attack, there is still a risk of the information being recovered within a certain time complexity. In this paper, a lightweight nonlinear white-box SM4 implementation is proposed to prevent several typical attacks from extracting the secret key, which hides the encryption and decryption process in obfuscated lookup tables. Aiming to improve the diversity and ambiguity of the lookup tables as well as resist the different types of white-box attacks, the random bijective nonlinear mappings are applied as scrambling encodings of the lookup tables. Moreover, the memory occupation of the implementation doesn't increase significantly by simplifying the structure and using concatenation code. Through several quantitative indicators, including memory size, diversity, ambiguity, the time complexity required to extract the key, and the value space of the key and external encodings, it is proved that the security of the proposed implementation could been enhanced significantly, while no sacrificing the practicality, compared with the existing schemes.
引用
收藏
页码:68717 / 68727
页数:11
相关论文
共 28 条
[1]  
[Anonymous], 2012, SM4 BLOCK CIPHER ALG
[2]   A secure white-box SM4 implementation [J].
Bai, Kunpeng ;
Wu, Chuankun .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) :996-1006
[3]  
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[4]  
Bringer J., 2006, IACR Cryptology ePrint Archive, V2006, P468
[5]  
Chao Jin, 2021, 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), P3358, DOI 10.1109/EI252483.2021.9713048
[6]  
Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
[7]  
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[8]  
Goubin L, 2007, LECT NOTES COMPUT SC, V4876, P278
[9]  
Karroumi M, 2011, LECT NOTES COMPUT SC, V6829, P278
[10]  
Lin Ting-Ting, 2013, Journal of Software, V24, P2238, DOI 10.3724/SP.J.1001.2013.04356