On Security of a White-Box Implementation of SHARK

被引:3
作者
Shi, Yang [1 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China
来源
INFORMATION SECURITY, ISC 2015 | 2015年 / 9290卷
关键词
White-box attack contexts; Symmetric encryption; Key exposure; SHARK; Cryptanalysis; ENCRYPTION ALGORITHM; CRYPTANALYSIS; AES;
D O I
10.1007/978-3-319-23318-5_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a white-box attack context, an attacker has full visibility of the implementation of a cipher and full control over its execution environment. As a countermeasure against the threat of a key exposure in this context, a white-box implementation of the block cipher SHARK, i. e., the white-box SHARK, was proposed in a piece of prior work in 2013. However, based on our observation and investigation, it has been derived that the white-box SHARK is insufficiently secure, where the hidden key and external encodings can be extracted with a work factor of approximately 1.5 * (2 <^> 47).
引用
收藏
页码:455 / 471
页数:17
相关论文
共 50 条
[31]   A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs [J].
Shi, Yang ;
Wei, Wujing ;
He, Zongjian .
SENSORS, 2015, 15 (05) :11928-11952
[32]   A New Feistel-Type White-Box Encryption Scheme [J].
Lin, Ting-Ting ;
Lai, Xue-Jia ;
Xue, Wei-Jia ;
Jia, Yin .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (02) :386-395
[33]   Another Look on Bucketing Attack to Defeat White-Box Implementations [J].
Zeyad, Mohamed ;
Maghrebi, Houssem ;
Alessio, Davide ;
Batteux, Boris .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 :99-117
[34]   White-Box Cryptography: Don't Forget About Grey-Box Attacks [J].
Bock, Estuardo Alpirez ;
Bos, Joppe W. ;
Brzuska, Chris ;
Hubain, Charles ;
Michiels, Wil ;
Mune, Cristofaro ;
Gonzalez, Eloi Sanfelix ;
Teuwen, Philippe ;
Treff, Alexander .
JOURNAL OF CRYPTOLOGY, 2019, 32 (04) :1095-1143
[35]   Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [J].
Bos, Joppe W. ;
Hubain, Charles ;
Michiels, Wil ;
Teuwen, Philippe .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :215-236
[36]   LPN-based Attacks in the White-box Setting [J].
Charlès A. ;
Udovenko A. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04) :318-343
[37]   Cryptanalysis of ARX-based White-box Implementations [J].
Biryukov A. ;
Lambin B. ;
Udovenko A. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03) :97-135
[38]   Cryptanalysis of a white-box SM4 implementation based on collision attack [J].
Wang, Rusi ;
Guo, Hua ;
Lu, Jiqiang ;
Liu, Jianwei .
IET INFORMATION SECURITY, 2022, 16 (01) :18-27
[39]   Measuring Performances of a White-Box Approach in the IoT Context [J].
Albricci, Daniele Giacomo Vittorio ;
Ceria, Michela ;
Cioschi, Federico ;
Fornari, Nicolo ;
Shakiba, Arvin ;
Visconti, Andrea .
SYMMETRY-BASEL, 2019, 11 (08)
[40]   Attacking White-Box AES Constructions [J].
McMillion, Brendan ;
Sullivan, Nick .
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, :85-90