Two Attacks on a White-Box AES Implementation

被引:0
|
作者
Lepoint, Tancrede [1 ,2 ]
Rivain, Matthieu [1 ]
De Mulder, Yoni [3 ]
Roelse, Peter [4 ]
Preneel, Bart [3 ]
机构
[1] CryptoExperts, Paris, France
[2] Ecole Normale Superieure, Paris, France
[3] KU Leuven & iMinds, Heverlee, Belgium
[4] Irdeto B V, Hoof, Netherlands
来源
关键词
White-box cryptography; AES implementation; Dual cipher; Cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack (referred to as the BGE attack) on this implementation, extracts extracting its embedded AES key with a work factor of 2(30). In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to 2(22) when all improvements are implemented. This paper also presents a new attack on the initial white-box implementation of Chow et al. This attack exploits collisions occurring on internal variables of the implementation and it achieves a work factor of 2(22). Eventually, we address the whitebox AES implementation presented by Karroumi in 2010 which aims to withstand the BGE attack. We show that the implementations of Karroumi and Chow et al. are the same, making them both vulnerable to the same attacks.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
  • [31] Automating the BGE Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    2020 IEEE 10TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2020,
  • [32] A new method for white-box implementation of CLEFIA algorithm
    Yao S.
    Chen J.
    Gong Y.
    Xu D.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 150 - 158
  • [33] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270
  • [34] How to reveal the secrets of an obscure white-box implementation
    Goubin, Louis
    Paillier, Pascal
    Rivain, Matthieu
    Wang, Junwei
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 49 - 66
  • [35] White-box content camouflage attacks against deep learning
    Chen, Tianrong
    Ling, Jie
    Sun, Yuping
    COMPUTERS & SECURITY, 2022, 117
  • [36] Study on White-Box Cryptography: Key Whitening and Entropy Attacks
    Bhatia, Kratika
    Som, Subhranil
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 323 - 327
  • [37] Impact of White-Box Adversarial Attacks on Convolutional Neural Networks
    Podder, Rakesh
    Ghosh, Sudipto
    2024 International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024 - Proceedings, 2024, : 41 - 49
  • [38] How to reveal the secrets of an obscure white-box implementation
    Louis Goubin
    Pascal Paillier
    Matthieu Rivain
    Junwei Wang
    Journal of Cryptographic Engineering, 2020, 10 : 49 - 66
  • [39] A secure white-box SM4 implementation
    Bai, Kunpeng
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 996 - 1006
  • [40] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Tao Xu
    Feng Liu
    Chuankun Wu
    Multimedia Tools and Applications, 2018, 77 : 18117 - 18137