Protect white-box AES to resist table composition attacks

被引:14
|
作者
Bai, Kunpeng [1 ]
Wu, Chuankun [2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo-Lai-You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table- composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
引用
收藏
页码:305 / 313
页数:9
相关论文
共 50 条
  • [1] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285
  • [2] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [3] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [4] Attacking White-Box AES Constructions
    McMillion, Brendan
    Sullivan, Nick
    SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
  • [5] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [6] A New Attempt of White-box AES Implementation
    Luo, Rui
    Lai, Xuejia
    You, Rong
    2014 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2014, : 423 - 429
  • [7] Protecting White-Box AES with Dual Ciphers
    Karroumi, Mohamed
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 278 - 291
  • [8] Cryptanalysis of a Perturbated White-Box AES Implementation
    De Mulder, Yoni
    Wyseur, Brecht
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 292 - +
  • [9] Gradient Correction for White-Box Adversarial Attacks
    Liu, Hongying
    Ge, Zhijin
    Zhou, Zhenyu
    Shang, Fanhua
    Liu, Yuanyuan
    Jiao, Licheng
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 35 (12) : 1 - 12
  • [10] DWB-AES: an implementation of dynamic white-box based on AES
    DWB-AES: 基于AES的动态白盒实现方法
    2021, Editorial Board of Journal on Communications (42): : 177 - 186