Filters








3,969 Hits in 3.9 sec

White-Box Cryptography and an AES Implementation [chapter]

Stanley Chow, Philip Eisen, Harold Johnson, Paul C. Van Oorschot
2003 Lecture Notes in Computer Science  
We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments.  ...  aes SubBytes table.  ...  As a proposal for pragmatically acceptable white-box attack-resistance, we present a new way of implementing aes using lookup tables representing encoded compositions.  ... 
doi:10.1007/3-540-36492-7_17 fatcat:yih6rtt4y5ejfjz3ywvxhte6ga

A Tutorial on White-Box AES [chapter]

James A. Muir
2012 Mathematics in Industry  
Such implementations are said to operate in a white-box attack context.  ...  The BGE attack can be used to extract an AES key from Chow et al.'  ...  Any AES implementation engineered to resist key extraction in the white-box attack context could be called white-box AES.  ... 
doi:10.1007/978-3-642-30904-5_9 fatcat:rxxq4m6d3rgrtnjlibo56k7lmu

White-box Implementation to Advantage DRM

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow
2017 International Journal on Advanced Science, Engineering and Information Technology  
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology.  ...  To withstand such attack, algorithm implementation is modified in such a way to make the implementation unintelligible, namely obfuscation approach.  ...  Comparison of standard AES and white-box AES (see Fig. 5 ) shows that to obfuscate the AES algorithm, each of its parts is diffused into several lookup tables.  ... 
doi:10.18517/ijaseit.7.1.1445 fatcat:iqhgu7khgvd2vp3sbqsblknlia

White-box Implementation to Advantage DRM

Antonius Cahya Prihandoko, Hossein Ghodosi, Bruce Litow
2017 International Journal on Advanced Science, Engineering and Information Technology  
White-box cryptography (WBC) is an obfuscation technique intended to protect secret keys from being disclosed in a software implementation using a fully transparent methodology.  ...  To withstand such attack, algorithm implementation is modified in such a way to make the implementation unintelligible, namely obfuscation approach.  ...  Comparison of standard AES and white-box AES (see Fig. 5 ) shows that to obfuscate the AES algorithm, each of its parts is diffused into several lookup tables.  ... 
doi:10.18517/ijaseit.7.2.1445 fatcat:i7va2yrd3zfmhoyd7wegur22mu

White-box attack context cryptovirology

Sébastien Josse
2008 Journal in Computer Virology  
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and  ...  New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications.  ...  of an encryption algorithm tailor-made to be white box resistant can lean upon these criteria to prove its security.  ... 
doi:10.1007/s11416-008-0097-x fatcat:hsp2h732bnbevhjdg2t64po7vy

White-Box Cryptography [chapter]

Gerrit Bleumer, Alex Biryukov, Collin Jackson, Alban Gabillon, V. N. Venkatakrishnan, Amit Klein, Dario V Forte, Dario V Forte, Ernesto Damiani, Frdrique Biennier, William Stallings, Paulo S. L. M. Barreto (+8 others)
2011 Encyclopedia of Cryptography and Security  
White-box cryptography is aimed at protecting secret keys from being disclosed in a software implementation.  ...  White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery.  ...  Acknowledgments I am grateful to B. Preneel and B. Wyseur for sending a copy of [7] . I am also grateful to O. Billet, E. Diehl, and C. Salmon-Legagneur for comments.  ... 
doi:10.1007/978-1-4419-5906-5_627 fatcat:hcg3cqhaq5bf7awq32gc3ur7ja

Cryptanalysis of a White Box AES Implementation [chapter]

Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
2004 Lecture Notes in Computer Science  
In this paper, we present an efficient practical attack against the obfuscated AES implementation [1] proposed at SAC 2002 as a means to protect AES software operated in the white box context against key  ...  We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 2 30 .  ...  Therefore, no general conclusion can be drawn about the possibility to construct a strong white box AES implementation, or a strong white box implementations of other iterated blockciphers.  ... 
doi:10.1007/978-3-540-30564-4_16 fatcat:kjgqwyfpbjfqnk2v2u4eggjth4

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [chapter]

Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2016 Lecture Notes in Computer Science  
In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort.  ...  Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products.  ...  A tutorial related to white-box AES is given in [49] .  ... 
doi:10.1007/978-3-662-53140-2_11 fatcat:vchh5a4ddnh2hfwvioakgehwz4

White-Box Cryptography Revisited

Andrey Bogdanov, Takanori Isobe
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
by a white-box attacker to maintain its functionality.  ...  White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has full access to their implementations.  ...  Acknowledgments We would like to thank Bart Preneel for his highly valuable and constructive feedback, which helped us to improve the technical and editorial quality of the paper.  ... 
doi:10.1145/2810103.2813699 dblp:conf/ccs/BogdanovI15 fatcat:kdylfpqjtrac7husaf6sfbguhe

A lightweight white-box symmetric encryption algorithm against node capture for WSNs

Yang Shi, Zongjian He
2014 2014 IEEE Wireless Communications and Networking Conference (WCNC)  
Handling white-box attacks in a WSN scenario is a challenging task.  ...  Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios.  ...  Next, we introduce the crux of how the proposed algorithms could resist against various white-box attacks and side-channel attacks in general.  ... 
doi:10.1109/wcnc.2014.6952994 dblp:conf/wcnc/ShiH14 fatcat:b7qzxspq5rcnxiazgvri52dkve

A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs

Yang Shi, Wujing Wei, Zongjian He
2015 Sensors  
Handling white-box attacks in a WSN scenario is a challenging task.  ...  Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios.  ...  Next, we introduce the crux of how the proposed algorithms could resist against various white-box attacks and side-channel attacks in general.  ... 
doi:10.3390/s150511928 pmid:26007737 pmcid:PMC4482007 fatcat:h2b5o7wjkfhlbmrcvnw4p3tuwe

The Long-Short-Key Primitive and Its Applications to Key Security [chapter]

Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
2008 Lecture Notes in Computer Science  
Using a pseudorandom generator and additional novel software-protection techniques, we show how to implement this construction securely for AES.  ...  On common PC architectures, such a long key normally does not fit in stack frames or cache blocks, forcing an attacker to search memory space.  ...  Our white-box protects against these attacks because of the long key and the additional amount of randomness in the cipher algorithm.  ... 
doi:10.1007/978-3-540-89598-5_19 fatcat:ty4odmmamzgz3d3p775pweap3e

A White-Box Implementation of IDEA

Siyu Pang, Tingting Lin, Xuejia Lai, Zheng Gong
2021 Symmetry  
However, there is little research into white-box IDEA. In traditional white-box implementations of existing block ciphers, S-boxes are always converted into encoded lookup tables.  ...  To our knowledge, this is the first public white-box IDEA solution, and its design by splitting can be applied to similar algebraic encryption structures.  ...  the resistance against white-box attacks (Type II).  ... 
doi:10.3390/sym13061066 fatcat:freiyiwt6fextb74jb5n5sazlu

White-Box Cryptography: Don't Forget About Grey-Box Attacks

Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2019 Journal of Cryptology  
In this paper, we describe new approaches to assess the security of white-box implementations which require neither knowledge about the look-up tables used nor expensive reverse-engineering efforts.  ...  Cryptologic Research 2019 white-box implementations significantly faster and without specific knowledge of the white-box design in an automated or semi-automated manner.  ...  A tutorial related to white-box AES is given in [66] .  ... 
doi:10.1007/s00145-019-09315-1 fatcat:23twlwuwuzgi7isnyh2uonu3v4

Table Redundancy Method for Protecting against Fault Attacks

Seungkwang Lee, Nam-su Jho, Myungchul Kim
2021 IEEE Access  
However, it does not mean that our proposed method is resistant to white-box attacks or every gray-box attack; this study is restricted to the fault attacks on the gray-box model in symmetric key cryptography  ...  To reduce the number of lookups, the initial white-box AES (WB-AES) implementation [14] turns AddRoundKey, SubBytes, and part of MixColumns into a composition by rewriting AES as follows: state ← plaintext  ... 
doi:10.1109/access.2021.3092314 fatcat:euwcuozlynhtjp3bxjo64otkky
« Previous Showing results 1 — 15 out of 3,969 results