Collision-Based Attacks on White-Box Implementations of the AES Block Cipher

被引:0
|
作者
Lu, Jiqiang [1 ,2 ,3 ]
Wang, Mingxue [1 ]
Wang, Can [1 ]
Yang, Chen [4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Beihang Univ, Hangzhou Innovat Inst, Hangzhou, Peoples R China
[4] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
来源
关键词
White-box cryptography; Block cipher; AES; Collision attack; CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1007/978-3-031-58411-4_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since Chow et al. introduced white-box cryptography with a white-box implementation of the AES block cipher in 2002, a few attacks and improvements on Chow et al.'s white-box AES implementation have been presented, particularly Lepoint et al. gave a collision-based attack with a time complexity of about 2(22) in 2013. Lepoint et al.'s attack involves three phases at a high level: first defining a collision function to recover a round's keyed S-box transformations each from protected input by a white-box encoding to original output, then recovering the output encoding of this round, and finally recovering the round key bytes of the next round by testing every key candidate under a statistical distinguisher. In this paper, we give two extensions to Lepoint et al.'s collision-based attack, one is by executing Lepoint et al.'s first phase for two consecutive rounds and then recovering the round key of the latter round directly from the two recovered SubBytes outputs of the two rounds, and the other is by executing Lepoint et al.'s first phase for two consecutive rounds, then executing Lepoint et al.'s second phase for the former round and finally recovering the round key of the latter round directly from the recovered keyed S-box transformations of the latter round. Compared with Lepoint et al.'s approach, the two extensions avoid the last one or two phases and the associated prerequisites, and thus they can attack a broader range of white-box implementations, specifically, the first extension targets SPN ciphers, and the second extension targets both SPN and Feistel ciphers. As an example, we apply the first extension to attack Bai et al.'s white-box AES implementation with an expected time complexity of about 2(20) S-box computations. Together with some previous work, our work indicates that all the previously published white-box AES implementations with external encodings are not practically secure, and white-box implementation designers should pay attention to these new collision-based approaches.
引用
收藏
页码:328 / 352
页数:25
相关论文
共 50 条
  • [41] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao Xu
    Chuankun Wu
    Feng Liu
    Ruoxin Zhao
    Science China Information Sciences, 2018, 61
  • [42] Efficient collision attacks on smart card implementations of masked AES
    WANG An
    WANG ZongYue
    ZHENG XueXin
    WANG XiaoMei
    CHEN Man
    ZHANG GuoShuang
    WU LiJi
    ScienceChina(InformationSciences), 2015, 58 (05) : 97 - 111
  • [43] Efficient collision attacks on smart card implementations of masked AES
    Wang An
    Wang ZongYue
    Zheng XueXin
    Wang XiaoMei
    Chen Man
    Zhang GuoShuang
    Wu LiJi
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 15
  • [44] NOVEL ADVERSARIAL DEFENSE TECHNIQUES FOR WHITE-BOX ATTACKS
    Van Tuinen, Jason
    Ranganath, Aditya
    Konjevod, Goran
    Singhal, Mukesh
    Marcia, Roummel
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 617 - 622
  • [45] Protecting white-box cryptographic implementations with obfuscated round boundaries
    Tao XU
    Chuankun WU
    Feng LIU
    Ruoxin ZHAO
    Science China(Information Sciences), 2018, 61 (03) : 237 - 239
  • [46] WBZUC: novel white-box ZUC-128 stream cipher
    Yang Y.
    Zhang R.
    Dong H.
    Ma Y.
    Zhang X.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (02): : 96 - 106
  • [47] WBZUC:novel white-box ZUC-128 stream cipher
    Yang Yatao
    Zhang Ruoqing
    Dong hui
    Ma Yingjie
    Zhang Xiaowei
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (02) : 96 - 106
  • [48] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    IET INFORMATION SECURITY, 2021, : 18 - 27
  • [49] Cryptanalysis of a white-box SM4 implementation based on collision attack
    Wang, Rusi
    Guo, Hua
    Lu, Jiqiang
    Liu, Jianwei
    IET Information Security, 2022, 16 (01) : 18 - 27
  • [50] Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations
    Tang Y.
    Gong Z.
    Li B.
    Zhao L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 493 - 522