White-Box Cryptography: Don’t Forget About Grey-Box Attacks
نویسندگان
چکیده
منابع مشابه
White-Box Cryptography: Don't Forget About Grey Box Attacks
Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the level of implementation knowledge required is only attainable through significant reverse engineering efforts. In this paper we describe new approache...
متن کاملWhite-Box Cryptography in the Gray Box
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...
متن کاملWhite Box Cryptography
This paper discusses white box cryptography, which is used to protect the key from white box attack. Previously white box cryptography was applied to symmetric key encryption, which does provide protection mechanism to the key, but affects the performance and is considered difficult to update the key. The scheme proposed by the researcher mentions White Box AES and improves its low performance ...
متن کاملOn White-Box Cryptography
White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions
متن کاملWhite Box Cryptography: Another Attempt
At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a “traceable block cipher” by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implementation. Our technique is quite general, and we apply it – as a challenging example in the domain of white box cryptography – to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2019
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-019-09315-1