Protect white-box AES to resist table composition attacks

被引:14
|
作者
Bai, Kunpeng [1 ]
Wu, Chuankun [2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
CRYPTANALYSIS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo-Lai-You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table- composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
引用
收藏
页码:305 / 313
页数:9
相关论文
共 50 条
  • [41] White-Box Program Tuning
    Lee, Wen-Chuan
    Liu, Yingqi
    Liu, Peng
    Ma, Shiqing
    Choi, Hongjun
    Zhang, Xiangyu
    Gupta, Rajiv
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO '19), 2019, : 122 - 135
  • [42] White-Box Atomic Multicast
    Gotsman, Alexey
    Lefort, Anatole
    Chockler, Gregory
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 176 - 187
  • [43] Black-Box Attacks on Graph Neural Networks via White-Box Methods With Performance Guarantees
    Yang, Jielong
    Ding, Rui
    Chen, Jianyu
    Zhong, Xionghu
    Zhao, Huarong
    Xie, Linbo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18193 - 18204
  • [44] White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
    Erba, Alessandro
    Tippenhauer, Nils Ole
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 111 - 131
  • [45] Quantum neural networks under depolarization noise: exploring white-box attacks and defenses
    Winderl, David
    Franco, Nicola
    Lorenz, Jeanette Miriam
    QUANTUM MACHINE INTELLIGENCE, 2024, 6 (02)
  • [46] Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures
    Tang Y.
    Gong Z.
    Chen J.
    Xie N.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 369 - 400
  • [47] White-box filtering attacks breaking SEL masking: from exponential to polynomial time
    Charlès, Alex
    Udovenko, Aleksei
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 1 - 24
  • [48] Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
    Di Crescenzo, Giovanni
    Bahler, Lisa
    McIntosh, Allen
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [49] Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021
    Bauer, Sven
    Drexler, Hermann
    Gebhardt, Max
    Klein, Dominik
    Laus, Friederike
    Mittmann, Johannes
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 25 - 55
  • [50] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    1600, Ruhr-University of Bochum (2020): : 327 - 357