Analytic Toolbox for White-Box Implementations: Limitation and Perspectives
نویسندگان
چکیده
White-box cryptography is an obfuscation technique to protect the secret key in the software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. This concept was presented in 2002 by Chow et al., and since then there have been many proposals to give solutions for the white-box cryptography. However, the progress does not seem to be substantial in spite of its practical importance. In fact, it is repeated that as a proposal on white-box implementation is announced, an attack of this implementation with lower complexity followed soon. It is mainly because most cryptanalytic methods were just targeted to some specific implementations and there is no general attack tool for the white-box cryptography. In this paper, we present a general analytic toolbox for white-box implementations which extracts the secret information obfuscated in the implementation. For a general SLT cipher on n bits with S-boxes on m bits, one can remove the nonlinear encodings with complexity O( n mQ 2Q) using our attack tool, if mQ-bit nonlinear encodings are used to obfuscate input/output values in the implementation. Also, one can recover the affine encoding A in time O( n m ·mA2) using our extended affine equivalence algorithm (EAEA), if the inverse of the encoded round function F on n bits is given, where mA is the smallest integer p such that A or its similar matrix obtained by permuting rows and columns is a block diagonal matrix with a p× p matrix as a block. To avoid our attack, we need to consider a special encoding of large mA, up to n. This results in storage blowing up in general. We suggest one approach with special affine encodings of mA = n that saves storage. In that case, the EAEA has the complexity O ( min { n m · n · 2, n · logn · √ 2 n }) , which can be large up to 2 and 2 for n = 128 and 256, respectively, when m = 8. This gives an approach to design secure white-box implementation with practical storage. We expect that our analytic toolbox initiates the research on white-box implementation design.
منابع مشابه
White-Box Security Notions for Symmetric Encryption Schemes
White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear wh...
متن کاملOn White-Box Cryptography
White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions
متن کاملRepresentation inheritance: a safe form of "white box" code inheritance
Inheritance as a programming language mechanism can be used to achieve several di erent goals, both in terms of expressing relationships between components and in terms of de ning new components \by di erence" from existing ones. For de ning new component implementations in terms of existing implementations, there are several approaches to using \code inheritance." Black box code inheritance al...
متن کاملA Tutorial on White-box AES
White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a white-box attack context. This is an attack model where all details of the implementation are completely visible to an attacker: not only do they see input and output, they see every intermediate comput...
متن کاملAnother Nail in the Coffin of White-Box AES Implementations
The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and execution environment. This concept was put forward a decade ago by Chow et al. (SAC 2002) who proposed the first white-box implementation of AES. Since then, several works have been dedicated to the desig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014