Two Attacks on a White-Box AES Implementation

被引:0
作者
Lepoint, Tancrede [1 ,2 ]
Rivain, Matthieu [1 ]
De Mulder, Yoni [3 ]
Roelse, Peter [4 ]
Preneel, Bart [3 ]
机构
[1] CryptoExperts, Paris, France
[2] Ecole Normale Superieure, Paris, France
[3] KU Leuven & iMinds, Heverlee, Belgium
[4] Irdeto B V, Hoof, Netherlands
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
White-box cryptography; AES implementation; Dual cipher; Cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack (referred to as the BGE attack) on this implementation, extracts extracting its embedded AES key with a work factor of 2(30). In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to 2(22) when all improvements are implemented. This paper also presents a new attack on the initial white-box implementation of Chow et al. This attack exploits collisions occurring on internal variables of the implementation and it achieves a work factor of 2(22). Eventually, we address the whitebox AES implementation presented by Karroumi in 2010 which aims to withstand the BGE attack. We show that the implementations of Karroumi and Chow et al. are the same, making them both vulnerable to the same attacks.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
[41]   White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode [J].
Zhou, Jie ;
Bai, Jian ;
Jiang, Meng Shan .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[42]   Cryptanalysis of a Generic Class of White-Box Implementations [J].
Michiels, Wil ;
Gorissen, Paul ;
Hollmann, Henk D. L. .
SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 :414-428
[43]   A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents [J].
Jin, Chao ;
Bao, Zhejing ;
Miao, Weiwei ;
Zeng, Zeng ;
Wei, Xiaogang ;
Zhang, Rui .
IEEE ACCESS, 2023, 11 :68717-68727
[44]   On Self-equivalence Encodings in White-Box Implementations [J].
Ranea, Adrian ;
Preneel, Bart .
SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 :639-669
[45]   White-Box Security Notions for Symmetric Encryption Schemes [J].
Delerablee, Cecile ;
Lepoint, Tancrede ;
Paillier, Pascal ;
Rivain, Matthieu .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 :247-264
[46]   Cryptanalysis of ARX-based White-box Implementations [J].
Biryukov A. ;
Lambin B. ;
Udovenko A. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03) :97-135
[47]   Implicit White-Box Implementations: White-Boxing ARX Ciphers [J].
Ranea, Adrian ;
Vandersmissen, Joachim ;
Preneel, Bart .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 :33-63
[48]   On the security goals of white-box cryptography [J].
Bock E.A. ;
Amadori A. ;
Brzuska C. ;
Michiels W. .
1600, Ruhr-University of Bochum (2020) :327-357
[49]   Cryptanalysis of a white-box SM4 implementation based on collision attack [J].
Wang, Rusi ;
Guo, Hua ;
Lu, Jiqiang ;
Liu, Jianwei .
IET INFORMATION SECURITY, 2022, 16 (01) :18-27
[50]   White-Box Implementation of Shamir's Identity-Based Signature Scheme [J].
Feng, Qi ;
He, Debiao ;
Wang, Huaqun ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :1820-1829