White-box cryptography and an AES implementation

被引:0
|
作者
Chow, S [1 ]
Eisen, P [1 ]
Johnson, H [1 ]
Van Orschot, PC [1 ]
机构
[1] Cloakware Corp, Ottawa, ON, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how AES can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our AES implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the AES SubBytes table.
引用
收藏
页码:250 / 270
页数:21
相关论文
共 50 条
  • [31] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143
  • [32] General digital rights management solution based on white-box cryptography
    Liu Jun
    Hu Yupu
    Chen Jie
    [J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28 (01) : 52 - 63
  • [33] An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
    Yim, Hyoungshin
    Kang, Ju-Sung
    Yeom, Yongjin
    [J]. 2021 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2021,
  • [34] General digital rights management solution based on white-box cryptography
    Jun, Liu
    Yupu, Hu
    Jie, Chen
    [J]. Journal of China Universities of Posts and Telecommunications, 2021, 28 (01): : 52 - 63
  • [35] A new method for white-box implementation of CLEFIA algorithm
    Yao, Si
    Chen, Jie
    Gong, Yating
    Xu, Dong
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 150 - 158
  • [36] Automating the BGE Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    [J]. 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2020,
  • [37] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270
  • [38] How to reveal the secrets of an obscure white-box implementation
    Louis Goubin
    Pascal Paillier
    Matthieu Rivain
    Junwei Wang
    [J]. Journal of Cryptographic Engineering, 2020, 10 : 49 - 66
  • [39] AES Based White Box Cryptography in Digital Signature Verification
    Shukla, Piyush Kumar
    Aljaedi, Amer
    Pareek, Piyush Kumar
    Alharbi, Adel R.
    Jamal, Sajjad Shaukat
    [J]. SENSORS, 2022, 22 (23)
  • [40] How to reveal the secrets of an obscure white-box implementation
    Goubin, Louis
    Paillier, Pascal
    Rivain, Matthieu
    Wang, Junwei
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 49 - 66