White-box cryptography and an AES implementation

被引:0
作者
Chow, S [1 ]
Eisen, P [1 ]
Johnson, H [1 ]
Van Orschot, PC [1 ]
机构
[1] Cloakware Corp, Ottawa, ON, Canada
来源
SELECTED AREAS IN CRYPTOGRAPHY | 2003年 / 2595卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how AES can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our AES implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the AES SubBytes table.
引用
收藏
页码:250 / 270
页数:21
相关论文
共 50 条
  • [41] A secure white-box SM4 implementation
    Bai, Kunpeng
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 996 - 1006
  • [42] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Tao Xu
    Feng Liu
    Chuankun Wu
    Multimedia Tools and Applications, 2018, 77 : 18117 - 18137
  • [43] White-box testing
    Cole, O
    DR DOBBS JOURNAL, 2000, 25 (03): : 23 - +
  • [44] White-box benchmarking
    Hernández, E
    Hey, T
    EURO-PAR '98 PARALLEL PROCESSING, 1998, 1470 : 220 - 223
  • [45] SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT
    Shi, Yang
    Wei, Wujing
    Zhang, Fangguo
    Luo, Xiapu
    He, Zongjian
    Fan, Hongfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1602 - 1616
  • [46] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Xu, Tao
    Liu, Feng
    Wu, Chuankun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18117 - 18137
  • [47] Research on disturbing white-box cryptography algorithm based on local differential privacy
    Luo, Wenjun
    Lai, Die
    Dai, Zesen
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [48] Improved White-box SM4 Design and Implementation
    Li, Yanjun
    Bi, Xinjie
    Jing, Xiaoyu
    Zou, Zexiao
    Yang, Long
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1256 - 1261
  • [49] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [50] A White-Box Cryptographic Implementation for Protecting against Power Analysis
    Lee, Seungkwang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) : 249 - 252