Protect white-box AES to resist table composition attacks

被引:14
|
作者
Bai, Kunpeng [1 ]
Wu, Chuankun [2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo-Lai-You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table- composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
引用
收藏
页码:305 / 313
页数:9
相关论文
共 50 条
  • [31] White-Box Security Notions for Symmetric Encryption Schemes
    Delerablee, Cecile
    Lepoint, Tancrede
    Paillier, Pascal
    Rivain, Matthieu
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 247 - 264
  • [32] Cryptanalysis of ARX-based White-box Implementations
    Biryukov A.
    Lambin B.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 97 - 135
  • [33] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270
  • [34] How to reveal the secrets of an obscure white-box implementation
    Goubin, Louis
    Paillier, Pascal
    Rivain, Matthieu
    Wang, Junwei
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 49 - 66
  • [35] A secure white-box SM4 implementation
    Bai, Kunpeng
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 996 - 1006
  • [36] Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
    Bock, Estuardo Alpirez
    Treff, Alexander
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 123 - 146
  • [37] White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 185 - 203
  • [38] White-Box Implementation of Shamir's Identity-Based Signature Scheme
    Feng, Qi
    He, Debiao
    Wang, Huaqun
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1820 - 1829
  • [39] Another Look on Bucketing Attack to Defeat White-Box Implementations
    Zeyad, Mohamed
    Maghrebi, Houssem
    Alessio, Davide
    Batteux, Boris
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 99 - 117
  • [40] A White-Box Encryption Scheme using Physically Unclonable Functions
    Rasoamiaramanana, Sandra
    Minier, Marine
    Macario-Rat, Gilles
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 279 - 286