On the Linear Transformation in White-Box Cryptography

被引:3
|
作者
Lee, Seungkwang [1 ,2 ]
Jho, Nam-Su [2 ]
Kim, Myungchul [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Sch Comp, Daejeon 34141, South Korea
[2] ETRI, Cryptog Engn Res Sect, Daejeon 34129, South Korea
关键词
White-box cryptography; linear transformation; key leakage; CRYPTANALYSIS;
D O I
10.1109/ACCESS.2020.2980594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A linear transformation is applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed. However, it has been shown that there still exists a correlation before and after the linear transformation, and thus this is not enough to protect the key against statistical analysis. So far, the Hamming weight of rows in the invertible matrix has been considered the main cause of the key leakage from the linear transformation. In this study, we present an in-depth analysis of the distribution of intermediate values and the characteristics of block invertible binary matrices. Our mathematical analysis and experimental results show that the balanced distribution of the key-dependent intermediate value is the main cause of the key leakage.
引用
收藏
页码:51684 / 51691
页数:8
相关论文
共 50 条
  • [1] Opportunities in White-Box Cryptography
    Michiels, Wil
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [2] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [3] On the security goals of white-box cryptography
    Bock, Estuardo Alpirez
    Amadori, Alessandro
    Brzuska, Chris
    Michiels, Wil
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357
  • [4] White-Box Cryptography: Security in an Insecure Environment
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (05) : 88 - 92
  • [5] Towards Security Notions for White-Box Cryptography
    Saxena, Amitabh
    Wyseur, Brecht
    Preneel, Bart
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 49 - +
  • [6] Discussion on the theoretical results of white-box cryptography
    Tingting LIN
    Xuejia LAI
    Weijia XUE
    Geshi HUANG
    [J]. Science China(Information Sciences), 2016, 59 (11) : 5 - 15
  • [7] Discussion on the theoretical results of white-box cryptography
    Lin, Tingting
    Lai, Xuejia
    Xue, Weijia
    Huang, Geshi
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (11)
  • [8] Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography
    Michiels, Wil
    Gorissen, Paul
    [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 82 - 89
  • [9] White-box Cryptography Revisited: Space-Hard Ciphers
    Bogdanov, Andrey
    Isobe, Takanori
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1058 - 1069
  • [10] White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 185 - 203