White-Box AES Implementation Revisited

被引:17
|
作者
Baek, Chung Hun [1 ]
Cheon, Jung Hee [1 ]
Hong, Hyunsook [1 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Advanced encryption standard (AES); block cipher; equivalence algorithm; specialized affine; white-box cryptography; white-box implementation;
D O I
10.1109/JCN.2016.000043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography presented by Chow et al. is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. Despite its practical importance, progress has not been substantial. In fact, it is repeated that as a proposal for a white-box implementation is reported, an attack of lower complexity is soon announced. This is mainly because most cryptanalytic methods target specific implementations, and there is no general attack tool for white-box cryptography. In this paper, we present an analytic toolbox on white-box implementations of the Chow et al.'s style using lookup tables. According to our toolbox, for a substitution-linear transformation cipher on n bits with S-boxes on m bits, the complexity for recovering the key obfuscated in the white-box implementation is O((3n/max(m(Q), m))2(3max(mQ,m)) + 2min {(n/m) L(m+3)2(2m), (n/m) L(3)2(3m) + n log L . 2(L/2)}), where m(Q) is the input size of nonlinear encodings, m(A) is the minimized block size of linear encodings, and L = lcm(m(A), m(Q)). As a result, a white-box implementation in the Chow et al.'s framework has complexity atmost O (min {(2(2m)/m) n(m+4), n log n.2(n/2) }), which is much less than 2(n). To overcome this, we introduce an idea that obfuscates two advanced encryption standard (AES)-128 ciphers at once with input/output encoding on 256 bits. To reduce storage, we use a sparse unsplit input encoding. As a result, our white-box AES implementation has up to 110-bit security against our toolbox, close to that of the original cipher. More generally, we may consider a white-box implementation of the t parallel encryption of AES to increase security.
引用
收藏
页码:273 / 287
页数:15
相关论文
共 50 条
  • [41] White-Box Atomic Multicast
    Gotsman, Alexey
    Lefort, Anatole
    Chockler, Gregory
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 176 - 187
  • [42] Analysis and Improvement of White-box SM4 Implementation br
    ZHANG, Yueyu
    XU, Dong
    CHEN, Jie
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (08) : 2903 - 2913
  • [43] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    1600, Ruhr-University of Bochum (2020): : 327 - 357
  • [44] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [45] A White-box Implementation of SM4 with Self-equivalence Encoding
    Chen, Jie
    Luo, Yinuo
    Liu, Jun
    Wang, Chao
    Zhang, Yueyu
    Dong, Xiaoli
    COMPUTER JOURNAL, 2023, 67 (03): : 1087 - 1098
  • [46] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    IET INFORMATION SECURITY, 2021, : 18 - 27
  • [47] Efficient and Provable White-Box Primitives
    Fouque, Pierre-Alain
    Karpman, Pierre
    Kirchner, Paul
    Minaud, Brice
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
  • [48] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    IET Information Security, 2022, 16 (01) : 18 - 27
  • [49] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378
  • [50] A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
    Lee, Seungkwang
    Kim, Taesung
    Kang, Yousung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2602 - 2615