White Box Cryptography: Another Attempt
@article{Bringer2006WhiteBC, title={White Box Cryptography: Another Attempt}, author={J. Bringer and H. Chabanne and Emmanuelle Dottax}, journal={IACR Cryptol. ePrint Arch.}, year={2006}, volume={2006}, pages={468} }
At CMS 2006 Bringer et al. show how to conceal the alge- braic structure of a \traceable block cipher" by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implemen- tation. Our technique is quite general, and we apply it { as a challenging example in the domain of white box cryptography { to a variant of the block cipher AES.
76 Citations
Higher-Order DCA against Standard Side-Channel Countermeasures
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2018
- 12
- PDF
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Mathematics, Computer Science
- ASIACRYPT
- 2014
- 81
- PDF
Another Nail in the Coffin of White-Box AES Implementations
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2013
- 14
- PDF
Cryptanalysis of a Perturbated White-Box AES Implementation
- Mathematics, Computer Science
- INDOCRYPT
- 2010
- 71
- Highly Influenced
- PDF
A new attempt of white-box AES implementation
- Computer Science
- Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
- 2014
- 10
White-box AES implementation revisited
- Computer Science
- Journal of Communications and Networks
- 2016
- 15
- PDF
References
SHOWING 1-10 OF 22 REFERENCES
Cryptanalysis of a White Box AES Implementation
- Computer Science
- Selected Areas in Cryptography
- 2004
- 172
- PDF
A White-Box DES Implementation for DRM Applications
- Computer Science
- Digital Rights Management Workshop
- 2002
- 248
- PDF
White-Box Cryptography and an AES Implementation
- Computer Science
- Selected Areas in Cryptography
- 2002
- 321
- PDF
Perturbing and Protecting a Traceable Block Cipher
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2006
- 18
- PDF
Clarifying Obfuscation: Improving the Security of White-Box Encoding
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2004
- 21
- PDF
Attacking an Obfuscated Cipher by Injecting Faults
- Computer Science
- Digital Rights Management Workshop
- 2002
- 93
- PDF
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Computer Science
- EUROCRYPT
- 1996
- 544
- PDF