Analytic Toolbox for White-Box Implementations: Limitation and Perspectives

نویسندگان

  • Chung Hun Baek
  • Jung Hee Cheon
  • Hyunsook Hong
چکیده

White-box cryptography is an obfuscation technique to protect the secret key in the software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. This concept was presented in 2002 by Chow et al., and since then there have been many proposals to give solutions for the white-box cryptography. However, the progress does not seem to be substantial in spite of its practical importance. In fact, it is repeated that as a proposal on white-box implementation is announced, an attack of this implementation with lower complexity followed soon. It is mainly because most cryptanalytic methods were just targeted to some specific implementations and there is no general attack tool for the white-box cryptography. In this paper, we present a general analytic toolbox for white-box implementations which extracts the secret information obfuscated in the implementation. For a general SLT cipher on n bits with S-boxes on m bits, one can remove the nonlinear encodings with complexity O( n mQ 2Q) using our attack tool, if mQ-bit nonlinear encodings are used to obfuscate input/output values in the implementation. Also, one can recover the affine encoding A in time O( n m ·mA2) using our extended affine equivalence algorithm (EAEA), if the inverse of the encoded round function F on n bits is given, where mA is the smallest integer p such that A or its similar matrix obtained by permuting rows and columns is a block diagonal matrix with a p× p matrix as a block. To avoid our attack, we need to consider a special encoding of large mA, up to n. This results in storage blowing up in general. We suggest one approach with special affine encodings of mA = n that saves storage. In that case, the EAEA has the complexity O ( min { n m · n · 2, n · logn · √ 2 n }) , which can be large up to 2 and 2 for n = 128 and 256, respectively, when m = 8. This gives an approach to design secure white-box implementation with practical storage. We expect that our analytic toolbox initiates the research on white-box implementation design.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

White-Box Security Notions for Symmetric Encryption Schemes

White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear wh...

متن کامل

On White-Box Cryptography

White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions

متن کامل

Representation inheritance: a safe form of "white box" code inheritance

Inheritance as a programming language mechanism can be used to achieve several di erent goals, both in terms of expressing relationships between components and in terms of de ning new components \by di erence" from existing ones. For de ning new component implementations in terms of existing implementations, there are several approaches to using \code inheritance." Black box code inheritance al...

متن کامل

A Tutorial on White-box AES

White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a white-box attack context. This is an attack model where all details of the implementation are completely visible to an attacker: not only do they see input and output, they see every intermediate comput...

متن کامل

Another Nail in the Coffin of White-Box AES Implementations

The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and execution environment. This concept was put forward a decade ago by Chow et al. (SAC 2002) who proposed the first white-box implementation of AES. Since then, several works have been dedicated to the desig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014