A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
White-Box Cryptography and an AES Implementation
[chapter]
2003
Lecture Notes in Computer Science
We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. ...
aes SubBytes table. ...
As a proposal for pragmatically acceptable white-box attack-resistance, we present a new way of implementing aes using lookup tables representing encoded compositions. ...
doi:10.1007/3-540-36492-7_17
fatcat:yih6rtt4y5ejfjz3ywvxhte6ga
A Tutorial on White-Box AES
[chapter]
2012
Mathematics in Industry
Such implementations are said to operate in a white-box attack context. ...
The BGE attack can be used to extract an AES key from Chow et al.' ...
Any AES implementation engineered to resist key extraction in the white-box attack context could be called white-box AES. ...
doi:10.1007/978-3-642-30904-5_9
fatcat:rxxq4m6d3rgrtnjlibo56k7lmu
White-box Implementation to Advantage DRM
2017
International Journal on Advanced Science, Engineering and Information Technology
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology. ...
To withstand such attack, algorithm implementation is modified in such a way to make the implementation unintelligible, namely obfuscation approach. ...
Comparison of standard AES and white-box AES (see Fig. 5 ) shows that to obfuscate the AES algorithm, each of its parts is diffused into several lookup tables. ...
doi:10.18517/ijaseit.7.1.1445
fatcat:iqhgu7khgvd2vp3sbqsblknlia
White-box Implementation to Advantage DRM
2017
International Journal on Advanced Science, Engineering and Information Technology
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology. ...
To withstand such attack, algorithm implementation is modified in such a way to make the implementation unintelligible, namely obfuscation approach. ...
Comparison of standard AES and white-box AES (see Fig. 5 ) shows that to obfuscate the AES algorithm, each of its parts is diffused into several lookup tables. ...
doi:10.18517/ijaseit.7.2.1445
fatcat:i7va2yrd3zfmhoyd7wegur22mu
White-box attack context cryptovirology
2008
Journal in Computer Virology
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and ...
New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications. ...
of an encryption algorithm tailor-made to be white box resistant can lean upon these criteria to prove its security. ...
doi:10.1007/s11416-008-0097-x
fatcat:hsp2h732bnbevhjdg2t64po7vy
White-Box Cryptography
[chapter]
2011
Encyclopedia of Cryptography and Security
White-box cryptography is aimed at protecting secret keys from being disclosed in a software implementation. ...
White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. ...
Acknowledgments I am grateful to B. Preneel and B. Wyseur for sending a copy of [7] . I am also grateful to O. Billet, E. Diehl, and C. Salmon-Legagneur for comments. ...
doi:10.1007/978-1-4419-5906-5_627
fatcat:hcg3cqhaq5bf7awq32gc3ur7ja
Cryptanalysis of a White Box AES Implementation
[chapter]
2004
Lecture Notes in Computer Science
In this paper, we present an efficient practical attack against the obfuscated AES implementation [1] proposed at SAC 2002 as a means to protect AES software operated in the white box context against key ...
We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 2 30 . ...
Therefore, no general conclusion can be drawn about the possibility to construct a strong white box AES implementation, or a strong white box implementations of other iterated blockciphers. ...
doi:10.1007/978-3-540-30564-4_16
fatcat:kjgqwyfpbjfqnk2v2u4eggjth4
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
[chapter]
2016
Lecture Notes in Computer Science
In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort. ...
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. ...
A tutorial related to white-box AES is given in [49] . ...
doi:10.1007/978-3-662-53140-2_11
fatcat:vchh5a4ddnh2hfwvioakgehwz4
White-Box Cryptography Revisited
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
by a white-box attacker to maintain its functionality. ...
White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has full access to their implementations. ...
Acknowledgments We would like to thank Bart Preneel for his highly valuable and constructive feedback, which helped us to improve the technical and editorial quality of the paper. ...
doi:10.1145/2810103.2813699
dblp:conf/ccs/BogdanovI15
fatcat:kdylfpqjtrac7husaf6sfbguhe
A lightweight white-box symmetric encryption algorithm against node capture for WSNs
2014
2014 IEEE Wireless Communications and Networking Conference (WCNC)
Handling white-box attacks in a WSN scenario is a challenging task. ...
Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. ...
Next, we introduce the crux of how the proposed algorithms could resist against various white-box attacks and side-channel attacks in general. ...
doi:10.1109/wcnc.2014.6952994
dblp:conf/wcnc/ShiH14
fatcat:b7qzxspq5rcnxiazgvri52dkve
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs
2015
Sensors
Handling white-box attacks in a WSN scenario is a challenging task. ...
Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. ...
Next, we introduce the crux of how the proposed algorithms could resist against various white-box attacks and side-channel attacks in general. ...
doi:10.3390/s150511928
pmid:26007737
pmcid:PMC4482007
fatcat:h2b5o7wjkfhlbmrcvnw4p3tuwe
The Long-Short-Key Primitive and Its Applications to Key Security
[chapter]
2008
Lecture Notes in Computer Science
Using a pseudorandom generator and additional novel software-protection techniques, we show how to implement this construction securely for AES. ...
On common PC architectures, such a long key normally does not fit in stack frames or cache blocks, forcing an attacker to search memory space. ...
Our white-box protects against these attacks because of the long key and the additional amount of randomness in the cipher algorithm. ...
doi:10.1007/978-3-540-89598-5_19
fatcat:ty4odmmamzgz3d3p775pweap3e
A White-Box Implementation of IDEA
2021
Symmetry
However, there is little research into white-box IDEA. In traditional white-box implementations of existing block ciphers, S-boxes are always converted into encoded lookup tables. ...
To our knowledge, this is the first public white-box IDEA solution, and its design by splitting can be applied to similar algebraic encryption structures. ...
the resistance against white-box attacks (Type II). ...
doi:10.3390/sym13061066
fatcat:freiyiwt6fextb74jb5n5sazlu
White-Box Cryptography: Don't Forget About Grey-Box Attacks
2019
Journal of Cryptology
In this paper, we describe new approaches to assess the security of white-box implementations which require neither knowledge about the look-up tables used nor expensive reverse-engineering efforts. ...
Cryptologic Research 2019 white-box implementations significantly faster and without specific knowledge of the white-box design in an automated or semi-automated manner. ...
A tutorial related to white-box AES is given in [66] . ...
doi:10.1007/s00145-019-09315-1
fatcat:23twlwuwuzgi7isnyh2uonu3v4
Table Redundancy Method for Protecting against Fault Attacks
2021
IEEE Access
However, it does not mean that our proposed method is resistant to white-box attacks or every gray-box attack; this study is restricted to the fault attacks on the gray-box model in symmetric key cryptography ...
To reduce the number of lookups, the initial white-box AES (WB-AES) implementation [14] turns AddRoundKey, SubBytes, and part of MixColumns into a composition by rewriting AES as follows: state ← plaintext ...
doi:10.1109/access.2021.3092314
fatcat:euwcuozlynhtjp3bxjo64otkky
« Previous
Showing results 1 — 15 out of 3,969 results