On Security of a White-Box Implementation of SHARK

被引:3
作者
Shi, Yang [1 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China
来源
INFORMATION SECURITY, ISC 2015 | 2015年 / 9290卷
关键词
White-box attack contexts; Symmetric encryption; Key exposure; SHARK; Cryptanalysis; ENCRYPTION ALGORITHM; CRYPTANALYSIS; AES;
D O I
10.1007/978-3-319-23318-5_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a white-box attack context, an attacker has full visibility of the implementation of a cipher and full control over its execution environment. As a countermeasure against the threat of a key exposure in this context, a white-box implementation of the block cipher SHARK, i. e., the white-box SHARK, was proposed in a piece of prior work in 2013. However, based on our observation and investigation, it has been derived that the white-box SHARK is insufficiently secure, where the hidden key and external encodings can be extracted with a work factor of approximately 1.5 * (2 <^> 47).
引用
收藏
页码:455 / 471
页数:17
相关论文
共 50 条
[21]   A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents [J].
Jin, Chao ;
Bao, Zhejing ;
Miao, Weiwei ;
Zeng, Zeng ;
Wei, Xiaogang ;
Zhang, Rui .
IEEE ACCESS, 2023, 11 :68717-68727
[22]   Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge [J].
Bock, Estuardo Alpirez ;
Treff, Alexander .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 :123-146
[23]   Implicit White-Box Implementations: White-Boxing ARX Ciphers [J].
Ranea, Adrian ;
Vandersmissen, Joachim ;
Preneel, Bart .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 :33-63
[24]   On Self-equivalence Encodings in White-Box Implementations [J].
Ranea, Adrian ;
Preneel, Bart .
SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 :639-669
[25]   On the Linear Transformation in White-Box Cryptography [J].
Lee, Seungkwang ;
Jho, Nam-Su ;
Kim, Myungchul .
IEEE ACCESS, 2020, 8 :51684-51691
[26]   A White-box Implementation of SM4 with Self-equivalence Encoding [J].
Chen, Jie ;
Luo, Yinuo ;
Liu, Jun ;
Wang, Chao ;
Zhang, Yueyu ;
Dong, Xiaoli .
COMPUTER JOURNAL, 2023, 67 (03) :1087-1098
[27]   Efficient and Provable White-Box Primitives [J].
Fouque, Pierre-Alain ;
Karpman, Pierre ;
Kirchner, Paul ;
Minaud, Brice .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :159-188
[28]   White-Box Implementation of Shamir's Identity-Based Signature Scheme [J].
Feng, Qi ;
He, Debiao ;
Wang, Huaqun ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :1820-1829
[29]   A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis [J].
Lee, Seungkwang ;
Kim, Taesung ;
Kang, Yousung .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) :2602-2615
[30]   A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs [J].
Shi, Yang ;
Wei, Wujing ;
He, Zongjian .
SENSORS, 2015, 15 (05) :11928-11952