Two Attacks on a White-Box AES Implementation

被引:0
|
作者
Lepoint, Tancrede [1 ,2 ]
Rivain, Matthieu [1 ]
De Mulder, Yoni [3 ]
Roelse, Peter [4 ]
Preneel, Bart [3 ]
机构
[1] CryptoExperts, Paris, France
[2] Ecole Normale Superieure, Paris, France
[3] KU Leuven & iMinds, Heverlee, Belgium
[4] Irdeto B V, Hoof, Netherlands
来源
关键词
White-box cryptography; AES implementation; Dual cipher; Cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack (referred to as the BGE attack) on this implementation, extracts extracting its embedded AES key with a work factor of 2(30). In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to 2(22) when all improvements are implemented. This paper also presents a new attack on the initial white-box implementation of Chow et al. This attack exploits collisions occurring on internal variables of the implementation and it achieves a work factor of 2(22). Eventually, we address the whitebox AES implementation presented by Karroumi in 2010 which aims to withstand the BGE attack. We show that the implementations of Karroumi and Chow et al. are the same, making them both vulnerable to the same attacks.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
  • [1] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [2] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [3] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [4] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [5] Protect white-box AES to resist table composition attacks
    Bai, Kunpeng
    Wu, Chuankun
    Zhang, Zhenfeng
    IET INFORMATION SECURITY, 2018, 12 (04) : 305 - 313
  • [6] DWB-AES: an implementation of dynamic white-box based on AES
    DWB-AES: 基于AES的动态白盒实现方法
    2021, Editorial Board of Journal on Communications (42): : 177 - 186
  • [7] An AES-Like Cipher and Its White-Box Implementation
    Bai, Kunpeng
    Wu, Chuankun
    COMPUTER JOURNAL, 2016, 59 (07): : 1054 - 1065
  • [8] Attacking White-Box AES Constructions
    McMillion, Brendan
    Sullivan, Nick
    SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
  • [9] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [10] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    SYMMETRY-BASEL, 2021, 13 (06):