Protect white-box AES to resist table composition attacks

被引:14
|
作者
Bai, Kunpeng [1 ]
Wu, Chuankun [2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo-Lai-You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table- composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
引用
收藏
页码:305 / 313
页数:9
相关论文
共 50 条
  • [31] White-Box Cryptography: Don't Forget About Grey-Box Attacks
    Bock, Estuardo Alpirez
    Bos, Joppe W.
    Brzuska, Chris
    Hubain, Charles
    Michiels, Wil
    Mune, Cristofaro
    Gonzalez, Eloi Sanfelix
    Teuwen, Philippe
    Treff, Alexander
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1095 - 1143
  • [32] APDL: an adaptive step size method for white-box adversarial attacks
    Hu, Jiale
    Li, Xiang
    Liu, Changzheng
    Zhang, Ronghua
    Tang, Junwei
    Sun, Yi
    Wang, Yuedong
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [33] Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
    Zhou, Yunyi
    Gao, Haichang
    He, Jianping
    Zhang, Shudong
    Wu, Zihui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (04) : 979 - 988
  • [34] Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning
    Zhang, Yinghua
    Song, Yangqiu
    Liang, Jian
    Bai, Kun
    Yang, Qiang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2989 - 2997
  • [35] Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks
    Goubin L.
    Rivain M.
    Wang J.
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020, 3 (454-482): : 454 - 482
  • [36] Comparing white-box, black-box, and glass-box composition of a spect mechanisms
    Kojarski, Sergei
    Lorenz, David H.
    REUSE OF OFF-THE-SHELF COMPONENTS, PROCEEDINGS, 2006, 4039 : 246 - 259
  • [37] Revisiting Higher-order Computational Attacks against White-box Implementations
    Maghrebi, Houssem
    Alessio, Davide
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 265 - 272
  • [38] Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
    Lee, Seungkwang
    Choi, Dooho
    Choi, Yong-Je
    ETRI JOURNAL, 2015, 37 (05) : 1012 - 1022
  • [39] A White-Box Implementation of IDEA
    Pang, Siyu
    Lin, Tingting
    Lai, Xuejia
    Gong, Zheng
    SYMMETRY-BASEL, 2021, 13 (06):
  • [40] Opportunities in White-Box Cryptography
    Michiels, Wil
    IEEE SECURITY & PRIVACY, 2010, 8 (01) : 64 - 67