Advertisement

Protecting white-box cryptographic implementations with obfuscated round boundaries

  • Tao Xu
  • Chuankun Wu
  • Feng Liu
  • Ruoxin Zhao
Letter
  • 103 Downloads

Notes

Acknowledgements

This work was supported by National Key R&D Program of China (Grant No. 2016YFB0800100), CAS Strategic Priority Research Program (Grant No. XDA06010701), and National Natural Science Foundation of China (Grant No. 61671448).

Supplementary material

11432_2016_9171_MOESM1_ESM.pdf (583 kb)
Supplementary material, approximately 584 KB.

References

  1. 1.
    Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250–270CrossRefGoogle Scholar
  2. 2.
    Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227–240Google Scholar
  3. 3.
    Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2009. 414–428CrossRefGoogle Scholar
  4. 4.
    Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2014. 63–84Google Scholar
  5. 5.
    Bogdanov A, Isobe T. White-box cryptography revisited: space-hard ciphers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015. 1058–1069Google Scholar
  6. 6.
    Bogdanov A, Isobe T, Tischhauser E. Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2016. 126–158Google Scholar
  7. 7.
    Xu T, Liu F, Wu C K. A white-box AES-like implementation based on key-dependent substitution-linear transformations. Multimed Tools Appl, 2017, doi: 10.1007/s11042-017-4562-8Google Scholar
  8. 8.
    Delerablée C, Lepoint T, Paillier P, et al. White-box security notions for symmetric encryption schemes. In: Proceedings of International Conference on Selected Areas in Cryptography. Berlin: Springer, 2013. 247–264Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina
  3. 3.New United Group Co., Ltd.ChangzhouChina
  4. 4.School of MathematicsShandong UniversityJinanChina
  5. 5.School of Big Data and Computer ScienceGuizhou Normal UniversityGuiyangChina

Personalised recommendations