Collision-Based Attacks on White-Box Implementations of the AES Block Cipher

被引:0
|
作者
Lu, Jiqiang [1 ,2 ,3 ]
Wang, Mingxue [1 ]
Wang, Can [1 ]
Yang, Chen [4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Beihang Univ, Hangzhou Innovat Inst, Hangzhou, Peoples R China
[4] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
来源
关键词
White-box cryptography; Block cipher; AES; Collision attack; CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1007/978-3-031-58411-4_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since Chow et al. introduced white-box cryptography with a white-box implementation of the AES block cipher in 2002, a few attacks and improvements on Chow et al.'s white-box AES implementation have been presented, particularly Lepoint et al. gave a collision-based attack with a time complexity of about 2(22) in 2013. Lepoint et al.'s attack involves three phases at a high level: first defining a collision function to recover a round's keyed S-box transformations each from protected input by a white-box encoding to original output, then recovering the output encoding of this round, and finally recovering the round key bytes of the next round by testing every key candidate under a statistical distinguisher. In this paper, we give two extensions to Lepoint et al.'s collision-based attack, one is by executing Lepoint et al.'s first phase for two consecutive rounds and then recovering the round key of the latter round directly from the two recovered SubBytes outputs of the two rounds, and the other is by executing Lepoint et al.'s first phase for two consecutive rounds, then executing Lepoint et al.'s second phase for the former round and finally recovering the round key of the latter round directly from the recovered keyed S-box transformations of the latter round. Compared with Lepoint et al.'s approach, the two extensions avoid the last one or two phases and the associated prerequisites, and thus they can attack a broader range of white-box implementations, specifically, the first extension targets SPN ciphers, and the second extension targets both SPN and Feistel ciphers. As an example, we apply the first extension to attack Bai et al.'s white-box AES implementation with an expected time complexity of about 2(20) S-box computations. Together with some previous work, our work indicates that all the previously published white-box AES implementations with external encodings are not practically secure, and white-box implementation designers should pay attention to these new collision-based approaches.
引用
收藏
页码:328 / 352
页数:25
相关论文
共 50 条
  • [1] Towards practical white-box lightweight block cipher implementations for IoTs
    Zhou, Lu
    Su, Chunhua
    Wen, Yamin
    Li, Weijie
    Gong, Zheng
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 507 - 514
  • [2] WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations
    Tang, Yufeng
    Gong, Zheng
    Sun, Tao
    Chen, Jinhai
    Liu, Zhe
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3375 - 3388
  • [3] Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher
    Lu, Jiqiang
    Li, Jingyu
    Chen, Zexuan
    Li, Yanan
    [J]. COMPUTER JOURNAL, 2023, 67 (05): : 1663 - 1673
  • [4] Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher
    Lu, Jiqiang
    Li, Jingyu
    [J]. INFORMATION SECURITY (ISC 2021), 2021, 13118 : 54 - 69
  • [5] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [6] An AES-Like Cipher and Its White-Box Implementation
    Bai, Kunpeng
    Wu, Chuankun
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1054 - 1065
  • [7] A DFA Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 591 - 617
  • [8] Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
    Biryukov, Alex
    Udovenko, Aleksei
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 219 - 248
  • [9] Protect white-box AES to resist table composition attacks
    Bai, Kunpeng
    Wu, Chuankun
    Zhang, Zhenfeng
    [J]. IET INFORMATION SECURITY, 2018, 12 (04) : 305 - 313
  • [10] Automating the BGE Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    [J]. 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2020,