White-box cryptography and an AES implementation

被引:0
作者
Chow, S [1 ]
Eisen, P [1 ]
Johnson, H [1 ]
Van Orschot, PC [1 ]
机构
[1] Cloakware Corp, Ottawa, ON, Canada
来源
SELECTED AREAS IN CRYPTOGRAPHY | 2003年 / 2595卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how AES can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our AES implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the AES SubBytes table.
引用
收藏
页码:250 / 270
页数:21
相关论文
共 50 条
  • [21] Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography
    Michiels, Wil
    Gorissen, Paul
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 82 - 89
  • [22] Protect white-box AES to resist table composition attacks
    Bai, Kunpeng
    Wu, Chuankun
    Zhang, Zhenfeng
    IET INFORMATION SECURITY, 2018, 12 (04) : 305 - 313
  • [23] White-box Cryptography Revisited: Space-Hard Ciphers
    Bogdanov, Andrey
    Isobe, Takanori
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1058 - 1069
  • [24] Study on White-Box Cryptography: Key Whitening and Entropy Attacks
    Bhatia, Kratika
    Som, Subhranil
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 323 - 327
  • [25] Improvement on a Masked White-Box Cryptographic Implementation
    Lee, Seungkwang
    Kim, Myungchul
    IEEE ACCESS, 2020, 8 : 90992 - 91004
  • [26] A Selective Encryption Algorithm of Video Based on White-box AES
    Kou Xinyu
    Wang Xingjun
    TENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2018), 2018, 10806
  • [27] A DFA Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 591 - 617
  • [28] A white-box DES implementation for DRM applications
    Chow, S
    Eisen, P
    Johnson, H
    van Oorschot, PC
    DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 1 - 15
  • [29] Cryptanalysis of a white box AES implementation
    Billet, O
    Gilbert, H
    Ech-Chatbi, C
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 227 - 240
  • [30] White-Box Cryptography: Don’t Forget About Grey-Box Attacks
    Estuardo Alpirez Bock
    Joppe W. Bos
    Chris Brzuska
    Charles Hubain
    Wil Michiels
    Cristofaro Mune
    Eloi Sanfelix Gonzalez
    Philippe Teuwen
    Alexander Treff
    Journal of Cryptology, 2019, 32 : 1095 - 1143