An AES-Like Cipher and Its White-Box Implementation

被引:6
|
作者
Bai, Kunpeng [1 ,2 ]
Wu, Chuankun [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 07期
基金
国家高技术研究发展计划(863计划);
关键词
white-box cryptography; AES-like; key-dependent S-box; secure implementation;
D O I
10.1093/comjnl/bxv119
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography aims at implementing a cipher to protect its key from being extracted in an untrusted environment, where the attacker has full access to the execution of the cryptographic software. In 2002, Chow et al. proposed the original white-box implementation of AES. Afterwards, various white-box implementations were presented. However, they were all badly broken because of a weakness of the implemented cryptographic algorithms: every parameter of the cryptographic operations is fixed except the round keys. In this paper, we present an AES-like cipher based on key-dependent S-boxes. The new cipher is designed to meet the design criteria of AES and hence provides a security level comparable to AES to resist black-box attacks. Moreover, we present a white-box implementation for our AES-like cipher, which is sufficient to withstand existing white-box attacks.
引用
收藏
页码:1054 / 1065
页数:12
相关论文
共 50 条
  • [1] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Tao Xu
    Feng Liu
    Chuankun Wu
    [J]. Multimedia Tools and Applications, 2018, 77 : 18117 - 18137
  • [2] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Xu, Tao
    Liu, Feng
    Wu, Chuankun
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18117 - 18137
  • [3] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [4] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [5] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [6] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    [J]. 2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [7] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [8] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [9] DWB-AES: an implementation of dynamic white-box based on AES
    Wang, Bin
    Chen, Si
    Chen, Jiadong
    Wang, Xing
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 177 - 186
  • [10] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352