Filters








867 Hits in 5.6 sec

White-Box Cryptography Revisited

Andrey Bogdanov, Takanori Isobe
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
However, there is no secure white-box implementation of standard block ciphers such as DES and AES known to date: All published techniques have been practically broken.  ...  It measures the difficulty of compressing the white-box implementation of a cipher, and quantifies security against code lifting by the amount of code that needs to be extracted from the implementation  ...  Acknowledgments We would like to thank Bart Preneel for his highly valuable and constructive feedback, which helped us to improve the technical and editorial quality of the paper.  ... 
doi:10.1145/2810103.2813699 dblp:conf/ccs/BogdanovI15 fatcat:kdylfpqjtrac7husaf6sfbguhe

Measuring Performances of a White-Box Approach in the IoT Context

Daniele Giacomo Vittorio Albricci, Michela Ceria, Federico Cioschi, Nicolò Fornari, Arvin Shakiba, Andrea Visconti
2019 Symmetry  
We highlight the importance of white-box cryptography in the IoT context, but also the need to have a fast black-box implementation (server-side) of the cipher.  ...  In this paper, we focus on a family of white-box symmetric ciphers substitution–permutation network (SPN)box, extending and improving our previous paper on the topic presented at WIDECOM2019.  ...  It is very likely to have such devices in non-protected environment, where an adversary can access them and perform attacks.  ... 
doi:10.3390/sym11081000 fatcat:sjunkirxprbfhjyyd67443lcba

The Long-Short-Key Primitive and Its Applications to Key Security [chapter]

Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
2008 Lecture Notes in Computer Science  
Using a pseudorandom generator and additional novel software-protection techniques, we show how to implement this construction securely for AES.  ...  To address this problem, we designed and implemented a new primitive that helps provide better security for ciphers that use keys stored in easily accessible locations.  ...  The compact white-box implementation with the short key and without any additional obfuscation is only slightly slower than AES.  ... 
doi:10.1007/978-3-540-89598-5_19 fatcat:ty4odmmamzgz3d3p775pweap3e

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [chapter]

Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2016 Lecture Notes in Computer Science  
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products.  ...  In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort.  ...  A White-Box Implementation of the Karroumi Approach A white-box implementation of both the original AES approach [18] and the approach based on dual ciphers by Karroumi [30] is part of the Master thesis  ... 
doi:10.1007/978-3-662-53140-2_11 fatcat:vchh5a4ddnh2hfwvioakgehwz4

Efficient and Provable White-Box Primitives [chapter]

Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
2016 Lecture Notes in Computer Science  
In recent years there have been several attempts to build white-box block ciphers whose implementation aims to be incompressible.  ...  This includes the weak white-box ASASA construction by Bouillaguet, Biryukov and Khovratovich from Asiacrypt 2014, and the recent space-hard construction by Bogdanov and Isobe at CCS 2016.  ...  The authors would like to thank Florent Tardif for letting us use his test machine.  ... 
doi:10.1007/978-3-662-53887-6_6 fatcat:3k6pw6wt5zcgzkb67b5zwh4zrm

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes [chapter]

Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016 Lecture Notes in Computer Science  
Comparison of previous white-box AES variants.  ...  Finally, we propose a class of new primitives that combine a white-box algorithm with a standard block cipher to obtain white-box protection for encrypting long messages, with high security and reasonable  ...  ) and a relatively low cost of transition from 'classical' ciphers to the new primitive.  ... 
doi:10.1007/978-3-319-48965-0_55 fatcat:by6lfce5rndptfy4vvtt4zp5ui

Two Attacks on a White-Box AES Implementation [chapter]

Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
2014 Lecture Notes in Computer Science  
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment.  ...  In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES.  ...  In addition, this work was supported by the Flemish Government, FWO WET G.0213.11N and IWT GBO SEC SODA. Yoni De Mulder was supported in part by a research grant of iMinds of the Flemish Government.  ... 
doi:10.1007/978-3-662-43414-7_14 fatcat:sfbcs244trdrbijhgcmjsumrqa

Development of a Secure SMS Application using Advanced Encryption Standard (AES) on Android Platform

Muhammad Noman Riaz, Adeel Ikram
2018 International Journal of Mathematical Sciences and Computing  
Compromising an access to network operator registers gains access to SMS also.  ...  The AES algorithm technique uses very befuddled and sporadic encryption making data impregnable to attackers or hackers.  ...  White box testing helped to improve the code and removal of errors and bugs.  ... 
doi:10.5815/ijmsc.2018.02.04 fatcat:2opjsuk4vzh7riho6svp3j666e

White-Box Cryptography: Don't Forget About Grey-Box Attacks

Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2019 Journal of Cryptology  
Cryptologic Research 2019 white-box implementations significantly faster and without specific knowledge of the white-box design in an automated or semi-automated manner.  ...  In this paper, we describe new approaches to assess the security of white-box implementations which require neither knowledge about the look-up tables used nor expensive reverse-engineering efforts.  ...  white-box implementation of a standard algorithm (like AES or DES) but of a modified algorithm (like G • AES • F −1 or G • DES • F −1 ) which is of limited practical usage.  ... 
doi:10.1007/s00145-019-09315-1 fatcat:23twlwuwuzgi7isnyh2uonu3v4

White-box attack context cryptovirology

Sébastien Josse
2008 Journal in Computer Virology  
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and  ...  New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications.  ...  DES and AES white box implementations We present in this section the principles of the white box implementation of two well known algorithms: DES and AES.  ... 
doi:10.1007/s11416-008-0097-x fatcat:hsp2h732bnbevhjdg2t64po7vy

Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations

Julien Bringer, Hervé Chabanne, Jean-Luc Danger
2009 2009 International Conference on Reconfigurable Computing and FPGAs  
In this work, we focus on FPGA (Field-Programmable Gate Array) technologies and examine how to thwart SCARE attacks by implementing a block cipher following white-box techniques.  ...  White-box cryptography has been developed to protect programs against an adversary who has full access to their software implementation.  ...  Practically, this leads ciphers to be represented by a network of look-up tables. White-box implementations for DES and AES have been given in [2, 3] .  ... 
doi:10.1109/reconfig.2009.19 dblp:conf/reconfig/BringerCD09 fatcat:4v72nrd2lfa3fdhz56uue3mbfq

A Tutorial on White-Box AES [chapter]

James A. Muir
2012 Mathematics in Industry  
Here, we review the first white-box AES implementation proposed by Chow et al. and give detailed information on how to construct it.  ...  The goal of a white-box attacker when targeting an implementation of a cipher is typically to extract the cryptographic key; thus, white-box implementations have been designed to thwart this goal (i.e.  ...  Any AES implementation engineered to resist key extraction in the white-box attack context could be called white-box AES.  ... 
doi:10.1007/978-3-642-30904-5_9 fatcat:rxxq4m6d3rgrtnjlibo56k7lmu

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) [chapter]

Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
2014 Lecture Notes in Computer Science  
In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components.  ...  We design several encryption schemes based on the ASASA structure ranging from fast and generic symmetric ciphers to compact public key and whitebox constructions based on generic affine transformations  ...  Acknowledgements We thank Willi Meier for fruitful comments and the discussion about the results of this paper. We also thank anonymous reviewers for comments, which helped to improve the paper.  ... 
doi:10.1007/978-3-662-45611-8_4 fatcat:byouh5wpfje6vl3lyovrc2dgpu

Next Generation Encryption Using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks

Vikas Kaul, Bhushan Nemade, Vinayak Bharadi, S.K. Narayan khedkar
2016 Procedia Computer Science  
Enhancement is done in AES by first using chaos and then modifying the S-box .The use of chaos sequence makes the key space infinite and the static S-box is made dynamic using cipher key.  ...  An enhanced encryption method with AES algorithm is used here within TLS.  ...  It uses two phases which are separated by 180°. E. AWGN Channel AWGN is an Additive White Gaussian Noise channel and it adds Gaussian noise to the input signal.  ... 
doi:10.1016/j.procs.2016.03.133 fatcat:jxmwslcl4favncvrokfslml6c4

White-box Implementation to Advantage DRM

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow
2017 International Journal on Advanced Science, Engineering and Information Technology  
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology.  ...  However, executing these algorithms in an insecure environment may allow adversaries to compromise the system and obtain the key.  ...  The size and performance comparisons between standard AES and white-box AES implementation are presented in Table 1 .  ... 
doi:10.18517/ijaseit.7.1.1445 fatcat:iqhgu7khgvd2vp3sbqsblknlia
« Previous Showing results 1 — 15 out of 867 results