Protect white-box AES to resist table composition attacks

被引:14
|
作者
Bai, Kunpeng [1 ]
Wu, Chuankun [2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo-Lai-You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table- composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
引用
收藏
页码:305 / 313
页数:9
相关论文
共 50 条
  • [41] Cryptanalysis of white-box DES implementations with arbitrary external encodings
    Wyseur, Brecht
    Michiels, Wil
    Gorissen, Paul
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 264 - +
  • [42] A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
    Shi, Yang
    Wei, Wujing
    Fan, Hongfei
    Au, Man Ho
    Luo, Xiapu
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1411 - 1427
  • [43] A White-Box Encryption Scheme using Physically Unclonable Functions
    Rasoamiaramanana, Sandra
    Minier, Marine
    Macario-Rat, Gilles
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 279 - 286
  • [44] LWARX: Lightweight ARX white-box cipher for satellite communications
    Yang, Yatao
    Dong, Hui
    Chen, Liangyu
    Li, Zhaofu
    Xia, Chao
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [45] A New Feistel-Type White-Box Encryption Scheme
    Ting-Ting Lin
    Xue-Jia Lai
    Wei-Jia Xue
    Yin Jia
    Journal of Computer Science and Technology, 2017, 32 : 386 - 395
  • [46] A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
    Shi, Yang
    Liu, Qin
    Zhao, Qinpei
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [47] WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations
    Tang, Yufeng
    Gong, Zheng
    Sun, Tao
    Chen, Jinhai
    Liu, Zhe
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3375 - 3388
  • [48] Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
    Bos, Joppe W.
    Hubain, Charles
    Michiels, Wil
    Teuwen, Philippe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 215 - 236
  • [49] WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
    Liu, Jun
    Rijmen, Vincent
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (03)
  • [50] SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT
    Shi, Yang
    Wei, Wujing
    Zhang, Fangguo
    Luo, Xiapu
    He, Zongjian
    Fan, Hongfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1602 - 1616