A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

被引:28
作者
Shi, Yang [1 ]
Liu, Qin [1 ]
Zhao, Qinpei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200184, Peoples R China
基金
中国国家自然科学基金;
关键词
CRYPTANALYSIS; AES; MDS;
D O I
10.1155/2013/431794
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.
引用
收藏
页数:9
相关论文
共 20 条
  • [1] [Anonymous], LNCS
  • [2] Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
  • [3] Biryukov A, 2003, LECT NOTES COMPUT SC, V2656, P33
  • [4] Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
  • [5] Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
  • [6] Linear frameworks for block ciphers
    Daemen, J
    Knudsen, LR
    Rijmen, V
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 22 (01) : 65 - 87
  • [7] The Weights in MDS Codes
    Ezerman, Martianus Frederic
    Grassl, Markus
    Sole, Patrick
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 392 - 396
  • [8] Goubin L, 2007, LECT NOTES COMPUT SC, V4876, P278
  • [9] Jacob M, 2002, LECT NOTES COMPUT SC, V2696, P16
  • [10] Jakobsen T, 1997, LECT NOTES COMPUT SC, V1267, P28