Two Attacks on a White-Box AES Implementation

被引:0
|
作者
Lepoint, Tancrede [1 ,2 ]
Rivain, Matthieu [1 ]
De Mulder, Yoni [3 ]
Roelse, Peter [4 ]
Preneel, Bart [3 ]
机构
[1] CryptoExperts, Paris, France
[2] Ecole Normale Superieure, Paris, France
[3] KU Leuven & iMinds, Heverlee, Belgium
[4] Irdeto B V, Hoof, Netherlands
来源
关键词
White-box cryptography; AES implementation; Dual cipher; Cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack (referred to as the BGE attack) on this implementation, extracts extracting its embedded AES key with a work factor of 2(30). In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to 2(22) when all improvements are implemented. This paper also presents a new attack on the initial white-box implementation of Chow et al. This attack exploits collisions occurring on internal variables of the implementation and it achieves a work factor of 2(22). Eventually, we address the whitebox AES implementation presented by Karroumi in 2010 which aims to withstand the BGE attack. We show that the implementations of Karroumi and Chow et al. are the same, making them both vulnerable to the same attacks.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
  • [41] White-box and Black-box Adversarial Attacks to Obstacle Avoidance in Mobile Robots
    Rano, Inaki
    Christensen, Anders Lyhne
    2023 EUROPEAN CONFERENCE ON MOBILE ROBOTS, ECMR, 2023, : 64 - 69
  • [42] White-box testing
    Cole, O
    DR DOBBS JOURNAL, 2000, 25 (03): : 23 - +
  • [43] White-box benchmarking
    Hernández, E
    Hey, T
    EURO-PAR '98 PARALLEL PROCESSING, 1998, 1470 : 220 - 223
  • [44] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Xu, Tao
    Liu, Feng
    Wu, Chuankun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18117 - 18137
  • [45] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143
  • [46] White-Box Cryptography: Don’t Forget About Grey-Box Attacks
    Estuardo Alpirez Bock
    Joppe W. Bos
    Chris Brzuska
    Charles Hubain
    Wil Michiels
    Cristofaro Mune
    Eloi Sanfelix Gonzalez
    Philippe Teuwen
    Alexander Treff
    Journal of Cryptology, 2019, 32 : 1095 - 1143
  • [47] Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
    Yunyi ZHOU
    Haichang GAO
    Jianping HE
    Shudong ZHANG
    Zihui WU
    Chinese Journal of Electronics, 2024, 33 (04) : 979 - 988
  • [48] APDL: an adaptive step size method for white-box adversarial attacks
    Hu, Jiale
    Li, Xiang
    Liu, Changzheng
    Zhang, Ronghua
    Tang, Junwei
    Sun, Yi
    Wang, Yuedong
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [49] Improved White-box SM4 Design and Implementation
    Li, Yanjun
    Bi, Xinjie
    Jing, Xiaoyu
    Zou, Zexiao
    Yang, Long
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1256 - 1261
  • [50] White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
    Sasdrich, Pascal
    Moradi, Amir
    Gueneysu, Tim
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 185 - 203