A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
White-Box Cryptography Revisited
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
However, there is no secure white-box implementation of standard block ciphers such as DES and AES known to date: All published techniques have been practically broken. ...
It measures the difficulty of compressing the white-box implementation of a cipher, and quantifies security against code lifting by the amount of code that needs to be extracted from the implementation ...
Acknowledgments We would like to thank Bart Preneel for his highly valuable and constructive feedback, which helped us to improve the technical and editorial quality of the paper. ...
doi:10.1145/2810103.2813699
dblp:conf/ccs/BogdanovI15
fatcat:kdylfpqjtrac7husaf6sfbguhe
Measuring Performances of a White-Box Approach in the IoT Context
2019
Symmetry
We highlight the importance of white-box cryptography in the IoT context, but also the need to have a fast black-box implementation (server-side) of the cipher. ...
In this paper, we focus on a family of white-box symmetric ciphers substitution–permutation network (SPN)box, extending and improving our previous paper on the topic presented at WIDECOM2019. ...
It is very likely to have such devices in non-protected environment, where an adversary can access them and perform attacks. ...
doi:10.3390/sym11081000
fatcat:sjunkirxprbfhjyyd67443lcba
The Long-Short-Key Primitive and Its Applications to Key Security
[chapter]
2008
Lecture Notes in Computer Science
Using a pseudorandom generator and additional novel software-protection techniques, we show how to implement this construction securely for AES. ...
To address this problem, we designed and implemented a new primitive that helps provide better security for ciphers that use keys stored in easily accessible locations. ...
The compact white-box implementation with the short key and without any additional obfuscation is only slightly slower than AES. ...
doi:10.1007/978-3-540-89598-5_19
fatcat:ty4odmmamzgz3d3p775pweap3e
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
[chapter]
2016
Lecture Notes in Computer Science
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. ...
In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort. ...
A White-Box Implementation of the Karroumi Approach A white-box implementation of both the original AES approach [18] and the approach based on dual ciphers by Karroumi [30] is part of the Master thesis ...
doi:10.1007/978-3-662-53140-2_11
fatcat:vchh5a4ddnh2hfwvioakgehwz4
Efficient and Provable White-Box Primitives
[chapter]
2016
Lecture Notes in Computer Science
In recent years there have been several attempts to build white-box block ciphers whose implementation aims to be incompressible. ...
This includes the weak white-box ASASA construction by Bouillaguet, Biryukov and Khovratovich from Asiacrypt 2014, and the recent space-hard construction by Bogdanov and Isobe at CCS 2016. ...
The authors would like to thank Florent Tardif for letting us use his test machine. ...
doi:10.1007/978-3-662-53887-6_6
fatcat:3k6pw6wt5zcgzkb67b5zwh4zrm
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes
[chapter]
2016
Lecture Notes in Computer Science
Comparison of previous white-box AES variants. ...
Finally, we propose a class of new primitives that combine a white-box algorithm with a standard block cipher to obtain white-box protection for encrypting long messages, with high security and reasonable ...
) and a relatively low cost of transition from 'classical' ciphers to the new primitive. ...
doi:10.1007/978-3-319-48965-0_55
fatcat:by6lfce5rndptfy4vvtt4zp5ui
Two Attacks on a White-Box AES Implementation
[chapter]
2014
Lecture Notes in Computer Science
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. ...
In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. ...
In addition, this work was supported by the Flemish Government, FWO WET G.0213.11N and IWT GBO SEC SODA. Yoni De Mulder was supported in part by a research grant of iMinds of the Flemish Government. ...
doi:10.1007/978-3-662-43414-7_14
fatcat:sfbcs244trdrbijhgcmjsumrqa
Development of a Secure SMS Application using Advanced Encryption Standard (AES) on Android Platform
2018
International Journal of Mathematical Sciences and Computing
Compromising an access to network operator registers gains access to SMS also. ...
The AES algorithm technique uses very befuddled and sporadic encryption making data impregnable to attackers or hackers. ...
White box testing helped to improve the code and removal of errors and bugs. ...
doi:10.5815/ijmsc.2018.02.04
fatcat:2opjsuk4vzh7riho6svp3j666e
White-Box Cryptography: Don't Forget About Grey-Box Attacks
2019
Journal of Cryptology
Cryptologic Research 2019 white-box implementations significantly faster and without specific knowledge of the white-box design in an automated or semi-automated manner. ...
In this paper, we describe new approaches to assess the security of white-box implementations which require neither knowledge about the look-up tables used nor expensive reverse-engineering efforts. ...
white-box implementation of a standard algorithm (like AES or DES) but of a modified algorithm (like G • AES • F −1 or G • DES • F −1 ) which is of limited practical usage. ...
doi:10.1007/s00145-019-09315-1
fatcat:23twlwuwuzgi7isnyh2uonu3v4
White-box attack context cryptovirology
2008
Journal in Computer Virology
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and ...
New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications. ...
DES and AES white box implementations We present in this section the principles of the white box implementation of two well known algorithms: DES and AES. ...
doi:10.1007/s11416-008-0097-x
fatcat:hsp2h732bnbevhjdg2t64po7vy
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
2009
2009 International Conference on Reconfigurable Computing and FPGAs
In this work, we focus on FPGA (Field-Programmable Gate Array) technologies and examine how to thwart SCARE attacks by implementing a block cipher following white-box techniques. ...
White-box cryptography has been developed to protect programs against an adversary who has full access to their software implementation. ...
Practically, this leads ciphers to be represented by a network of look-up tables. White-box implementations for DES and AES have been given in [2, 3] . ...
doi:10.1109/reconfig.2009.19
dblp:conf/reconfig/BringerCD09
fatcat:4v72nrd2lfa3fdhz56uue3mbfq
A Tutorial on White-Box AES
[chapter]
2012
Mathematics in Industry
Here, we review the first white-box AES implementation proposed by Chow et al. and give detailed information on how to construct it. ...
The goal of a white-box attacker when targeting an implementation of a cipher is typically to extract the cryptographic key; thus, white-box implementations have been designed to thwart this goal (i.e. ...
Any AES implementation engineered to resist key extraction in the white-box attack context could be called white-box AES. ...
doi:10.1007/978-3-642-30904-5_9
fatcat:rxxq4m6d3rgrtnjlibo56k7lmu
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
[chapter]
2014
Lecture Notes in Computer Science
In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components. ...
We design several encryption schemes based on the ASASA structure ranging from fast and generic symmetric ciphers to compact public key and whitebox constructions based on generic affine transformations ...
Acknowledgements We thank Willi Meier for fruitful comments and the discussion about the results of this paper. We also thank anonymous reviewers for comments, which helped to improve the paper. ...
doi:10.1007/978-3-662-45611-8_4
fatcat:byouh5wpfje6vl3lyovrc2dgpu
Next Generation Encryption Using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks
2016
Procedia Computer Science
Enhancement is done in AES by first using chaos and then modifying the S-box .The use of chaos sequence makes the key space infinite and the static S-box is made dynamic using cipher key. ...
An enhanced encryption method with AES algorithm is used here within TLS. ...
It uses two phases which are separated by 180°. E. AWGN Channel AWGN is an Additive White Gaussian Noise channel and it adds Gaussian noise to the input signal. ...
doi:10.1016/j.procs.2016.03.133
fatcat:jxmwslcl4favncvrokfslml6c4
White-box Implementation to Advantage DRM
2017
International Journal on Advanced Science, Engineering and Information Technology
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology. ...
However, executing these algorithms in an insecure environment may allow adversaries to compromise the system and obtain the key. ...
The size and performance comparisons between standard AES and white-box AES implementation are presented in Table 1 . ...
doi:10.18517/ijaseit.7.1.1445
fatcat:iqhgu7khgvd2vp3sbqsblknlia
« Previous
Showing results 1 — 15 out of 867 results