A white-box AES-like implementation based on key-dependent substitution-linear transformations

被引:7
作者
Xu, Tao [1 ,2 ]
Liu, Feng [1 ,2 ,3 ]
Wu, Chuankun [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Guizhou Normal Univ, Sch Big Data & Comp Sci, Guiyang, Guizhou, Peoples R China
[4] Beijing Kuangen Network Technol Co Ltd, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
White-box cryptography; AES-like; MDS matrix; Key-dependent; Key extraction; Malware;
D O I
10.1007/s11042-017-4562-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is becoming increasingly common to deploy cryptographic algorithms within software applications which are executed in untrusted environments owned and controlled by a possibly malicious party. White-box cryptography aims to protect the secret key in such an environment. Chow et al. developed a white-box AES implementation in 2002 by hiding secret keys into lookup tables. Afterwards, some improvements were proposed. However, all the published schemes have been shown to be insecure. AES was originally designed without consideration of execution in a white-box attack context. Because of the fixed confusion and diffusion operations, it is easy to break AES's white-box version. In this paper, we propose an AES-like cipher by replacing AES's S-boxes and MixColumn matrices with key-dependent components while keeping their good cryptographic properties. We show that the white-box implementation of our AES-like cipher can resist current known attacks.
引用
收藏
页码:18117 / 18137
页数:21
相关论文
共 23 条
[1]  
[Anonymous], 1978, The Theory of Error-Correcting Codes
[2]  
[Anonymous], P 9 WORKSH SEL AR CR
[3]  
[Anonymous], 2009, REV REMOTE SENSING A, DOI DOI 10.1109/CSA.2009.5404239
[4]  
[Anonymous], 2014, LNCS
[5]  
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-662-43414-7_14
[6]   An AES-Like Cipher and Its White-Box Implementation [J].
Bai, Kunpeng ;
Wu, Chuankun .
COMPUTER JOURNAL, 2016, 59 (07) :1054-1065
[7]  
Billet O., 2004, Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers (Lecture Notes in Computer Science Vol.3357), P227
[8]  
Biryukov A, 2003, LECT NOTES COMPUT SC, V2656, P33
[9]   Structural Cryptanalysis of SASAS [J].
Biryukov, Alex ;
Shamir, Adi .
JOURNAL OF CRYPTOLOGY, 2010, 23 (04) :505-518
[10]   White-box Cryptography Revisited: Space-Hard Ciphers [J].
Bogdanov, Andrey ;
Isobe, Takanori .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1058-1069