A New Attempt of White-box AES Implementation

被引:0
|
作者
Luo, Rui [1 ]
Lai, Xuejia [1 ]
You, Rong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Depeartment Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
white-box cryptography; white-box implementation; AES; software privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose an improved table-based white-box implementation of AES which is able to resist different types of attack, including the BGE attack and De Mulder et al.' s cryptanalysis, to protect information under "white-box attack context". The notion of white-box attack context, introduced by Chow et al., describes a general setting in which cryptographic algorithms are executed in untrusted environments. In this setting, adversaries have attained complete access to the implementations of cryptographic algorithms as well as the dynamic execution environments. The key strategy applied to our design is to compose different operations of the AES round function and convert the composition into encoded lookup tables. The new scheme exploits larger key-dependent tables, each of which contains two bytes of the round keys. We then analyze the security against different types of attack and measure two security metrics: the "white-box diversity" and "ambiguity". The new scheme can withstand the BGE attack due to the utilization of larger mixing bijections and tabulated "ShiftRows"; it can also resist the cryptanalysis of De Mulder et al. since the bindings between "nTMC" and "TSR" are irreducible and the non-linear encodings are introduced to all tables.
引用
收藏
页码:423 / 429
页数:7
相关论文
共 50 条
  • [1] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [2] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [3] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [4] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [5] DWB-AES: an implementation of dynamic white-box based on AES
    Wang, Bin
    Chen, Si
    Chen, Jiadong
    Wang, Xing
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 177 - 186
  • [6] An AES-Like Cipher and Its White-Box Implementation
    Bai, Kunpeng
    Wu, Chuankun
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1054 - 1065
  • [7] Attacking White-Box AES Constructions
    McMillion, Brendan
    Sullivan, Nick
    [J]. SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
  • [8] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    [J]. SYMMETRY-BASEL, 2021, 13 (06):
  • [9] Protecting White-Box AES with Dual Ciphers
    Karroumi, Mohamed
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 278 - 291
  • [10] A new method for white-box implementation of CLEFIA algorithm
    Yao, Si
    Chen, Jie
    Gong, Yating
    Xu, Dong
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 150 - 158