Cryptanalysis of white-box DES implementations with arbitrary external encodings

被引:0
|
作者
Wyseur, Brecht [1 ]
Michiels, Wil [2 ]
Gorissen, Paul [2 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT SCD COSIC, Kasteelpk Arenberg 10, B-3001 Heverlee, Belgium
[2] Philips Res Labs, NL-5656 Eindhoven, Netherlands
来源
基金
比利时弗兰德研究基金会;
关键词
white-box cryptography; obfuscation; DES; data encryption standard; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack context. In such a context, an attacker has full access to the implementation and its execution environment. In order to provide an extra level of security, an implementation shielded with external encodings was introduced by Chow et al. and improved by Link and Neumann [10]. In this paper, we present an algorithm to extract the secret key from such white-box DES implementations. The cryptanalysis is a differential attack on obfuscated rounds, and works regardless of the shielding external encodings that are applied. The cryptanalysis has a average time complexity of 2(14) and a negligible space complexity.
引用
收藏
页码:264 / +
页数:4
相关论文
共 50 条
  • [41] On the security goals of white-box cryptography
    Bock, Estuardo Alpirez
    Amadori, Alessandro
    Brzuska, Chris
    Michiels, Wil
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357
  • [42] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
  • [43] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [44] Efficient and Provable White-Box Primitives
    Fouque, Pierre-Alain
    Karpman, Pierre
    Kirchner, Paul
    Minaud, Brice
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
  • [45] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [46] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [47] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378
  • [48] Attacking White-Box AES Constructions
    McMillion, Brendan
    Sullivan, Nick
    [J]. SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
  • [49] White-box attack context cryptovirology
    Josse, Sebastien
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (04): : 321 - 334
  • [50] Towards a Theory of White-Box Security
    Herzberg, Amir
    Shulman, Haya
    Saxena, Amitabh
    Crispo, Bruno
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 342 - 352