White-Box Security Notions for Symmetric Encryption Schemes

被引:0
|
作者
Delerablee, Cecile [1 ]
Lepoint, Tancrede [1 ]
Paillier, Pascal [1 ]
Rivain, Matthieu [1 ]
机构
[1] CryptoExperts, F-75002 Paris, France
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
White-box cryptography; Security notions; Attack models; Security games; Traitor tracing; CRYPTANALYSIS; AES; EQUIVALENT; SIGNATURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear what white-box cryptography really aims to achieve and which security properties are expected from white-box programs in applications. This paper builds a first step towards a practical answer to this question by translating folklore intuitions behind white-box cryptography into concrete security notions. Specifically, we introduce the notion of white-box compiler that turns a symmetric encryption scheme into randomized white-box programs, and we capture several desired security properties such as one-wayness, incompressibility and traceability for white-box programs. We also give concrete examples of white-box compilers that already achieve some of these notions. Overall, our results open new perspectives on the design of white-box programs that securely implement symmetric encryption.
引用
收藏
页码:247 / 264
页数:18
相关论文
共 50 条
  • [21] Efficient and Provable White-Box Primitives
    Fouque, Pierre-Alain
    Karpman, Pierre
    Kirchner, Paul
    Minaud, Brice
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
  • [22] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [23] Implicit White-Box Implementations: White-Boxing ARX Ciphers
    Ranea, Adrian
    Vandersmissen, Joachim
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 33 - 63
  • [24] Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
    Bang, A. O.
    Rao, Udai Pratap
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08) : 11111 - 11137
  • [25] Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
    Biryukov, Alex
    Bouillaguet, Charles
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 63 - 84
  • [26] Another Look on Bucketing Attack to Defeat White-Box Implementations
    Zeyad, Mohamed
    Maghrebi, Houssem
    Alessio, Davide
    Batteux, Boris
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 99 - 117
  • [27] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [28] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [29] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143
  • [30] Improvement on a Masked White-Box Cryptographic Implementation
    Lee, Seungkwang
    Kim, Myungchul
    IEEE ACCESS, 2020, 8 : 90992 - 91004