White-Box Security Notions for Symmetric Encryption Schemes

被引:0
|
作者
Delerablee, Cecile [1 ]
Lepoint, Tancrede [1 ]
Paillier, Pascal [1 ]
Rivain, Matthieu [1 ]
机构
[1] CryptoExperts, F-75002 Paris, France
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
White-box cryptography; Security notions; Attack models; Security games; Traitor tracing; CRYPTANALYSIS; AES; EQUIVALENT; SIGNATURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear what white-box cryptography really aims to achieve and which security properties are expected from white-box programs in applications. This paper builds a first step towards a practical answer to this question by translating folklore intuitions behind white-box cryptography into concrete security notions. Specifically, we introduce the notion of white-box compiler that turns a symmetric encryption scheme into randomized white-box programs, and we capture several desired security properties such as one-wayness, incompressibility and traceability for white-box programs. We also give concrete examples of white-box compilers that already achieve some of these notions. Overall, our results open new perspectives on the design of white-box programs that securely implement symmetric encryption.
引用
收藏
页码:247 / 264
页数:18
相关论文
共 50 条
  • [31] Opportunities in White-Box Cryptography
    Michiels, Wil
    IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [32] White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
    Ziegler, Dominik
    Marsalek, Alexander
    Palfinger, Gerald
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 331 - 338
  • [33] White-Box cryptography based data encryption-decryption scheme for IoT environment
    Saha, Arunima
    Srinivasan, Chungath
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 637 - 641
  • [34] A White-Box Speck Implementation Using Self-equivalence Encodings
    Vandersmissen, Joachim
    Ranea, Adrian
    Preneel, Bart
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 771 - 791
  • [35] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270
  • [36] Cryptanalysis of ARX-based White-box Implementations
    Biryukov A.
    Lambin B.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 97 - 135
  • [37] LPN-based Attacks in the White-box Setting
    Charlès A.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 318 - 343
  • [38] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [39] Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Wei, Lifei
    Lin, Xiaodong
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 55 - 72
  • [40] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287