Corpus ID: 14957035

White Box Cryptography: Another Attempt

  title={White Box Cryptography: Another Attempt},
  author={J. Bringer and H. Chabanne and Emmanuelle Dottax},
  journal={IACR Cryptol. ePrint Arch.},
  • J. Bringer, H. Chabanne, Emmanuelle Dottax
  • Published 2006
  • Mathematics, Computer Science
  • IACR Cryptol. ePrint Arch.
  • At CMS 2006 Bringer et al. show how to conceal the alge- braic structure of a \traceable block cipher" by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implemen- tation. Our technique is quite general, and we apply it { as a challenging example in the domain of white box cryptography { to a variant of the block cipher AES. 
    76 Citations

    Figures, Tables, and Topics from this paper

    Protecting White-Box AES with Dual Ciphers
    • 86
    Higher-Order DCA against Standard Side-Channel Countermeasures
    • 12
    • PDF
    Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
    • 81
    • PDF
    Another Nail in the Coffin of White-Box AES Implementations
    • 14
    • PDF
    Cryptanalysis of a Perturbated White-Box AES Implementation
    • 71
    • Highly Influenced
    • PDF
    On Security of a White-Box Implementation of SHARK
    • 3
    A new attempt of white-box AES implementation
    • R. Luo, X. Lai, R. You
    • Computer Science
    • Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
    • 2014
    • 10
    White-Box Cryptography Revisited: Space-Hard Ciphers
    • 51
    White-box AES implementation revisited
    • 15
    • PDF
    How to Sign with White-Boxed AES
    • 1
    • PDF


    Cryptanalysis of a White Box AES Implementation
    • 172
    • PDF
    A White-Box DES Implementation for DRM Applications
    • 248
    • PDF
    A New Approach Towards Block Cipher Design
    • 16
    • PDF
    White-Box Cryptography and an AES Implementation
    • 321
    • PDF
    Perturbing and Protecting a Traceable Block Cipher
    • 18
    • PDF
    A Traceable Block Cipher
    • 44
    • Highly Influential
    • PDF
    Clarifying Obfuscation: Improving the Security of White-Box Encoding
    • 21
    • PDF
    Attacking an Obfuscated Cipher by Injecting Faults
    • 93
    • PDF
    Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
    • 544
    • PDF