Towards practical white-box lightweight block cipher implementations for IoTs

被引:6
作者
Zhou, Lu [1 ]
Su, Chunhua [1 ]
Wen, Yamin [2 ]
Li, Weijie [3 ]
Gong, Zheng [3 ]
机构
[1] Univ Aizu, Div Comp Sci, Aizu Wakamatsu, Fukushima, Japan
[2] Guangdong Univ Finance & Econ, Sch Math & Stat, Guangzhou 510320, Guangdong, Peoples R China
[3] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Guangdong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 86卷
基金
中国国家自然科学基金;
关键词
Internet of things (IoTs); White-box cryptography; Lightweight block cipher; Implementation;
D O I
10.1016/j.future.2018.04.011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to the Kerckhoffs's principle, the security of a system should be only depended on the security of its secret key. To build the trusted computing base, Secure Element (SE) and Trusted Execution Environment (TEE) have been proposed for secure computing and authentication. But users still need to believe that SE and TEE-supported hardware will not be evil or intruded. In order to totally remove the dependence of extra hardware, white-box cryptography was introduced by Chow et al. (2002) which gives a software solution for AES implementations in an extremely hostile environment. After Chow et al.'s seminal paper, many white-box implementations were proposed on different block ciphers. In IoTs applications, SE and TEE might have the practical issues if the implementation costs are constrained. In this paper, we first discuss the practical issues that relate to white-box block cipher implementations from lightweight block ciphers. Furthermore, we give the white-box implementations of KLEIN, Present and LBlock as the typical candidates that represent the Substitution-Permutation Network (SPN) and Feistel structures. Finally the performance and the costs are compared with the white-box AES implementation. The comparison shows that white-box implementations are not only related to block and key lengths, but also the structure of the cipher and its white-box implementation methodology strongly affect the implementation costs. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:507 / 514
页数:8
相关论文
共 20 条
[1]   Biclique cryptanalysis of the full-round KLEIN block cipher [J].
Ahmadian, Zahra ;
Salmasizadeh, Mahmoud ;
Aref, Mohammad Reza .
IET INFORMATION SECURITY, 2015, 9 (05) :294-301
[2]  
Aumasson JP, 2011, LECT NOTES COMPUT SC, V7107, P134
[3]  
Biryukov A, 2014, LECT NOTES COMPUT SC, V8873, P63, DOI 10.1007/978-3-662-45611-8_4
[4]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[5]  
Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283
[6]  
Bringer J., 2006, 2006468 CRYPT EPRINT
[7]  
Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
[8]  
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[9]  
Daemen Joan., 2002, The Design of Rijndael: AES - The Advanced Encryption Standard, DOI DOI 10.1007/978-3-662-04722-4
[10]  
Eisenbarth Thomas, 2012, Progress in Cryptology - AFRICACRYPT 2012. Proceedings 5th International Conference on Cryptology in Africa, P172, DOI 10.1007/978-3-642-31410-0_11