41 Hits in 6.2 sec

White-Box Cryptography: Don't Forget About Grey-Box Attacks

Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2019 Journal of Cryptology  
Cryptologic Research 2019 white-box implementations significantly faster and without specific knowledge of the white-box design in an automated or semi-automated manner.  ...  Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation  ...  a white-box AES implementation.  ... 
doi:10.1007/s00145-019-09315-1 fatcat:23twlwuwuzgi7isnyh2uonu3v4

Table Redundancy Method for Protecting against Fault Attacks

Seungkwang Lee, Nam-su Jho, Myungchul Kim
2021 IEEE Access  
Section II reviews the internal encoding with the table structure of a white-box AES-128 implementation and explains previous FA and countermeasures.  ...  INTERNAL ENCODING ON AES-128 White-box cryptography of block ciphers is mostly implemented in a table-based manner with linear and nonlinear transformations (the term encoding is often used) in order to  ... 
doi:10.1109/access.2021.3092314 fatcat:euwcuozlynhtjp3bxjo64otkky

A lightweight white-box symmetric encryption algorithm against node capture for WSNs

Yang Shi, Zongjian He
2014 2014 IEEE Wireless Communications and Networking Conference (WCNC)  
Handling white-box attacks in a WSN scenario is a challenging task.  ...  This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (No. 61202382) and the Youth Science and Technology Foundation of Shanghai (No. 15YF1412600).  ... 
doi:10.1109/wcnc.2014.6952994 dblp:conf/wcnc/ShiH14 fatcat:b7qzxspq5rcnxiazgvri52dkve

A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs

Yang Shi, Wujing Wei, Zongjian He
2015 Sensors  
Handling white-box attacks in a WSN scenario is a challenging task.  ...  This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (No. 61202382) and the Youth Science and Technology Foundation of Shanghai (No. 15YF1412600).  ... 
doi:10.3390/s150511928 pmid:26007737 pmcid:PMC4482007 fatcat:h2b5o7wjkfhlbmrcvnw4p3tuwe

Measuring Performances of a White-Box Approach in the IoT Context

Daniele Giacomo Vittorio Albricci, Michela Ceria, Federico Cioschi, Nicolò Fornari, Arvin Shakiba, Andrea Visconti
2019 Symmetry  
We highlight the importance of white-box cryptography in the IoT context, but also the need to have a fast black-box implementation (server-side) of the cipher.  ...  In this paper, we focus on a family of white-box symmetric ciphers substitution–permutation network (SPN)box, extending and improving our previous paper on the topic presented at WIDECOM2019.  ...  Internal and external encodings are also discussed in [30] , while a different approach, based on polynomial algebra techniques [31] , gave rise to a perturbated white-box implementation of AES [32]  ... 
doi:10.3390/sym11081000 fatcat:sjunkirxprbfhjyyd67443lcba

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography

Claude Carlet, Sylvain Guilley, Sihem Mesnager
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Such implementations are referred to as White-Box Cryptography (WBC). One technique consists of the algorithm's tabulation specialized for its key, followed by obfuscating the resulting tables.  ...  However, we show that such an attack does not work always (even if it works most of the time).Therefore, on the defense side, we give a straightforward rationale for the WBC implementations to be secure  ...  Acknowledgments The authors wish to thank Lucille Tordella on the one hand and Matthieu Desjardins on the other hand for their precious help in the early phases of this work.  ... 
doi:10.46586/tches.v2021.i4.57-87 fatcat:pqjutupue5dlnnyma4smqhziem

White Box Implementations Using Non-Commutative Cryptography

Leandro Marin
2019 Sensors  
The security of this method is based not only on the difficulty of the conjugacy search problem (in a harder version because only partial information about the groups is known by the attacker), but also  ...  The endomorphisms of a commutative group are non-commutative (in general), thus we can use a non-commutative group to emulate the arithmetic of a commutative one.  ...  However, not only DFA, the number of known attacks to white-box implementations of AES is huge.  ... 
doi:10.3390/s19051122 fatcat:zp7ixcui45hkjoob3tf5fqgbaq

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
We evaluate the prevailing methods, compare existing attacks using a common set of criteria, identify several challenges and shortcomings, and suggest future directions of research.  ...  Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs

Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
2011 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography  
We thoroughly analyse how clock glitches affect a commercial low-cost processor by performing a large number of experiments on five devices.  ...  Finally, we explain how typical fault attacks can be mounted on this device, and we describe a new attack for which the fault injection is easy and the cryptanalysis trivial.  ...  ACKNOWLEDGMENT The authors thankÓscar Repáraz for his initial work on the experimental setup. This work was supported in part by the European Commission's ECRYPT II NoE (ICT-2007-  ... 
doi:10.1109/fdtc.2011.9 dblp:conf/fdtc/BalaschGV11 fatcat:zipolq5isjailibfl2lkbm4yxq

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

Nikolaos Koutroumpouchos, Christoforos Ntantogian, Christos Xenakis
2021 Sensors  
Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view  ...  To this end, we provide a taxonomy of TrustZone attacks, analyze them, and more importantly derive a set of critical observations regarding their nature.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21020520 pmid:33450919 fatcat:mamfndmbcjbl7cpnr2j6dlxir4

On information invariants in robotics

Bruce Randall Donald
1995 Artificial Intelligence  
We consider how one might develop a kind of "calculus" on (a)-(e) in order to compare the power of sensor systems analytically. To this end, we attempt to develop a notion of information invariants.  ...  This paper represents our attempt to characterize a family of complicated and subtle issues concerned with measuring robot task complexity.  ...  I am very grateful to all of them for their generosity with their time and ideas.  ... 
doi:10.1016/0004-3702(94)00024-u fatcat:iw4ftgcz3vfnfdtu4tcen5tbwe

Recurrent Neural Networks [chapter]

Sajid A. Marhon, Christopher J. F. Cameron, Stefan C. Kremer
2013 Intelligent Systems Reference Library  
Learning is a critical issue and one of the primary advantages of neural networks.  ...  A goal is to design better algorithms that are both computationally efficient and simple to implement.  ...  Lund and Stefano Nolfi who did most of the development of the kepsim simulator, which has been used (in slightly adapted form) to implement the experiments documented in this paper.  ... 
doi:10.1007/978-3-642-36657-4_2 fatcat:jnmgv7rlifhuncqhi5kxldepdm

Building In-the-Cloud Network Functions: Security and Privacy Challenges

Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren
2021 Proceedings of the IEEE  
The article surveys the state-of-the-art literature on network function outsourcing, with a special focus on privacy and security issues.  ...  the white paper [1] .  ...  Architecture of BlindBox [24]. In the setup phase, the endpoint prepares a garbled AES embedded with the encryption key on the tokens.  ... 
doi:10.1109/jproc.2021.3127277 fatcat:getxjhn3s5eyllg6nxnpzsgrmq


In the area of fault analysis, we present several results on differential fault analysis (DFA) on the block cipher AES.  ...  In order to soften the a-priori knowledge on the injection technique needed by the attacker, we present a new approach for DFA based on clustering, called J-DFA.  ...  In fact, all DFA attacks against AES rely on a fault model implied by the attacker.  ... 
doi:10.13130/mella-silvia_phd2018-02-27 fatcat:phzf464ql5gvrdmhmbjzglsk4e

Analysis and Mitigation of Remote Side-Channel and Fault Attacks on the Electrical Level

Jonas Krautter, Mehdi B. Tahoori, Thomas Eisenbarth
In echten Implementierungen zeigen jedoch Angriffe über Seitenkanäle und Faults die Grenzen dieses sogenannten Black-Box-Modells auf.  ...  In the case of an external attacker, a standard implementation of the AES S-Box needs about 280 000 measurements for key recovery.  ...  .: Correlation over the amount of collected traces, when attacking the AES S-Box implemented as standard LUT-based logic through external measurements with an oscilloscope.  ... 
doi:10.5445/ir/1000144660 fatcat:kth32c56kzfmzlblmhp75pprju
« Previous Showing results 1 — 15 out of 41 results