On Security of a White-Box Implementation of SHARK

被引:3
|
作者
Shi, Yang [1 ]
Fan, Hongfei [1 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China
来源
关键词
White-box attack contexts; Symmetric encryption; Key exposure; SHARK; Cryptanalysis; ENCRYPTION ALGORITHM; CRYPTANALYSIS; AES;
D O I
10.1007/978-3-319-23318-5_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a white-box attack context, an attacker has full visibility of the implementation of a cipher and full control over its execution environment. As a countermeasure against the threat of a key exposure in this context, a white-box implementation of the block cipher SHARK, i. e., the white-box SHARK, was proposed in a piece of prior work in 2013. However, based on our observation and investigation, it has been derived that the white-box SHARK is insufficiently secure, where the hidden key and external encodings can be extracted with a work factor of approximately 1.5 * (2 <^> 47).
引用
收藏
页码:455 / 471
页数:17
相关论文
共 50 条
  • [1] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    SYMMETRY-BASEL, 2021, 13 (06):
  • [2] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    1600, Ruhr-University of Bochum (2020): : 327 - 357
  • [3] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [4] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
  • [5] Towards a Theory of White-Box Security
    Herzberg, Amir
    Shulman, Haya
    Saxena, Amitabh
    Crispo, Bruno
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 342 - 352
  • [6] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [7] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [8] White-Box Cryptography: Security in an Insecure Environment
    Beunardeau, Marc
    Connolly, Aisling
    Geraud, Remi
    Naccache, David
    IEEE SECURITY & PRIVACY, 2016, 14 (05) : 88 - 92
  • [9] Towards Security Notions for White-Box Cryptography
    Saxena, Amitabh
    Wyseur, Brecht
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 49 - +
  • [10] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429