White-box cryptography and an AES implementation

被引:0
作者
Chow, S [1 ]
Eisen, P [1 ]
Johnson, H [1 ]
Van Orschot, PC [1 ]
机构
[1] Cloakware Corp, Ottawa, ON, Canada
来源
SELECTED AREAS IN CRYPTOGRAPHY | 2003年 / 2595卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how AES can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our AES implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the AES SubBytes table.
引用
收藏
页码:250 / 270
页数:21
相关论文
共 50 条
  • [1] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [2] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [3] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [4] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [5] DWB-AES: an implementation of dynamic white-box based on AES
    DWB-AES: 基于AES的动态白盒实现方法
    2021, Editorial Board of Journal on Communications (42): : 177 - 186
  • [6] Opportunities in White-Box Cryptography
    Michiels, Wil
    IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [7] An AES-Like Cipher and Its White-Box Implementation
    Bai, Kunpeng
    Wu, Chuankun
    COMPUTER JOURNAL, 2016, 59 (07) : 1054 - 1065
  • [8] White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 185 - 203
  • [9] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    1600, Ruhr-University of Bochum (2020): : 327 - 357
  • [10] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    IEEE ACCESS, 2020, 8 : 51684 - 51691