White-box cryptography and an AES implementation

被引:0
|
作者
Chow, S [1 ]
Eisen, P [1 ]
Johnson, H [1 ]
Van Orschot, PC [1 ]
机构
[1] Cloakware Corp, Ottawa, ON, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how AES can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our AES implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the AES SubBytes table.
引用
收藏
页码:250 / 270
页数:21
相关论文
共 50 条
  • [1] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [2] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    [J]. 2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [3] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [4] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [5] DWB-AES: an implementation of dynamic white-box based on AES
    Wang, Bin
    Chen, Si
    Chen, Jiadong
    Wang, Xing
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 177 - 186
  • [6] Opportunities in White-Box Cryptography
    Michiels, Wil
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67
  • [7] White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 185 - 203
  • [8] An AES-Like Cipher and Its White-Box Implementation
    Bai, Kunpeng
    Wu, Chuankun
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1054 - 1065
  • [9] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [10] On the security goals of white-box cryptography
    Bock, Estuardo Alpirez
    Amadori, Alessandro
    Brzuska, Chris
    Michiels, Wil
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357