2010
DOI: 10.1007/978-3-642-17401-8_21
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Perturbated White-Box AES Implementation

Abstract: In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a novel white-box strategy. They propose to extend the round computations of a block cipher with a set of random equations and perturbations, and complicate the analysis by implementing each such round as one system that is obfuscated with annihilating linear input and output encodings. The improved version presented by Bringer et al. implements the AEw/oS, which is an AES version with key-dependent S-boxes (the S-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(32 citation statements)
references
References 14 publications
0
30
0
Order By: Relevance
“…Several research efforts have also been focused on key extraction of proposed whitebox ciphers via cryptanalysis [1,31,26,10,9]. However, these attacks assume that the location and structure of the LUTs used by the white-box ciphers is known or can be easily recovered from its binary file.…”
Section: White-box Cryptographymentioning
confidence: 99%
“…Several research efforts have also been focused on key extraction of proposed whitebox ciphers via cryptanalysis [1,31,26,10,9]. However, these attacks assume that the location and structure of the LUTs used by the white-box ciphers is known or can be easily recovered from its binary file.…”
Section: White-box Cryptographymentioning
confidence: 99%
“…A subsequent WB-AES design introduced perturbations in the cipher in an attempt to thwart the previous attack [14]. This approach was broken [51] using algebraic analysis with a 2 17 time complexity in 2010. Another WB-AES approach which resisted the previous attacks was presented in [69] in 2009 and got broken in 2012 with a work factor of 2 32 [50].…”
Section: White-box Advanced Encryption Standard (Wb-aes)mentioning
confidence: 99%
“…Note that S(x) is an S-box with an 8-bit input value, x, and Tboxes for round 10 have to absorb two round keys, 9 k and k 10 , where ,…”
Section: Addroundkey and Subbytesmentioning
confidence: 99%