2009
DOI: 10.1007/978-3-642-04474-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Security Notions for White-Box Cryptography

Abstract: Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some 'executable' code with an embedded secret key. WBC, if possible, would have several applications. However, unlike obfuscation, it lacks a theoretical foundation. We present a first step towards … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 22 publications
0
29
0
Order By: Relevance
“…Formal security notions for symmetric white-box schemes are discussed and introduced in [59,22]. In [11] it is shown how one can use the ASASA construction with injective Sboxes (where ASA stands for the affine-substitution-affine [55] construction) to instantiate white-box cryptography.…”
Section: Miscellaneous White-box Resultsmentioning
confidence: 99%
“…Formal security notions for symmetric white-box schemes are discussed and introduced in [59,22]. In [11] it is shown how one can use the ASASA construction with injective Sboxes (where ASA stands for the affine-substitution-affine [55] construction) to instantiate white-box cryptography.…”
Section: Miscellaneous White-box Resultsmentioning
confidence: 99%
“…A first step towards a theoretical model was proposed by Saxena, Wyseur and Preneel [28], and subsequently extended by Wyseur in his PhD thesis [30]. These results show how to translate any security notion in the black-box model into a security notion in the white-box model.…”
Section: Introductionmentioning
confidence: 93%
“…As a matter of fact, some of our security notions are not black-box notions that one would wish to preserve in the whitebox setting, but arise from new features potentially introduced by the white-box compilation. Note that although we use a different formalism and pursue different goals, our work and those in [28,30] are not in contradiction but rather co-exist in a wider framework.…”
Section: Introductionmentioning
confidence: 99%
“…This is not always relevant in RFID, where one may clearly distinguish the Human prover from the prover's device. We model these concepts by introducing the black-box [8,60] and white-box [15,52] models in our framework. This allows to refine the success probabilities of an adversary and point out that some published works underestimate the success probabilities when the prover has a full control on the execution of the algorithm.…”
Section: Prover Modelmentioning
confidence: 99%