Two Attacks on a White-Box AES Implementation

被引:0
作者
Lepoint, Tancrede [1 ,2 ]
Rivain, Matthieu [1 ]
De Mulder, Yoni [3 ]
Roelse, Peter [4 ]
Preneel, Bart [3 ]
机构
[1] CryptoExperts, Paris, France
[2] Ecole Normale Superieure, Paris, France
[3] KU Leuven & iMinds, Heverlee, Belgium
[4] Irdeto B V, Hoof, Netherlands
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
White-box cryptography; AES implementation; Dual cipher; Cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack (referred to as the BGE attack) on this implementation, extracts extracting its embedded AES key with a work factor of 2(30). In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to 2(22) when all improvements are implemented. This paper also presents a new attack on the initial white-box implementation of Chow et al. This attack exploits collisions occurring on internal variables of the implementation and it achieves a work factor of 2(22). Eventually, we address the whitebox AES implementation presented by Karroumi in 2010 which aims to withstand the BGE attack. We show that the implementations of Karroumi and Chow et al. are the same, making them both vulnerable to the same attacks.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
[31]   Efficient and Provable White-Box Primitives [J].
Fouque, Pierre-Alain ;
Karpman, Pierre ;
Kirchner, Paul ;
Minaud, Brice .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :159-188
[32]   A White-Box Cryptographic Implementation for Protecting against Power Analysis [J].
Lee, Seungkwang .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) :249-252
[33]   A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis [J].
Lee, Seungkwang ;
Kim, Taesung ;
Kang, Yousung .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) :2602-2615
[34]   Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks [J].
Goubin L. ;
Rivain M. ;
Wang J. .
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020, 3 (454-482) :454-482
[35]   A Secure and Efficient White-Box Implementation of SM4 [J].
Hu, Xiaobo ;
Yu, Yanyan ;
Tu, Yinzi ;
Wang, Jing ;
Chen, Shi ;
Bao, Yuqi ;
Zhang, Tengyuan ;
Xing, Yaowen ;
Zheng, Shihui .
ENTROPY, 2025, 27 (01)
[36]   Revisiting Higher-order Computational Attacks against White-box Implementations [J].
Maghrebi, Houssem ;
Alessio, Davide .
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, :265-272
[37]   White-Box ECDSA: Challenges and Existing Solutions [J].
Dottax, Emmanuelle ;
Giraud, Christophe ;
Houzelot, Agathe .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 :184-201
[38]   Opportunities in White-Box Cryptography [J].
Michiels, Wil .
IEEE SECURITY & PRIVACY, 2010, 8 (01) :64-67
[39]   A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts [J].
Shi, Yang ;
Liu, Qin ;
Zhao, Qinpei .
JOURNAL OF APPLIED MATHEMATICS, 2013,
[40]   White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode [J].
Zhou, Jie ;
Bai, Jian ;
Jiang, Meng Shan .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020