2014
DOI: 10.1007/978-3-662-43414-7_13
|View full text |Cite
|
Sign up to set email alerts
|

White-Box Security Notions for Symmetric Encryption Schemes

Abstract: Abstract. White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been proposed but they have all been broken. On the other hand, neither evidence of existence nor proofs of impossibility have been provided for this particular setting. This might be in part because it is still quite unclear what white-box cryptography really aims to achieve and which security properties are expected from white-box p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(55 citation statements)
references
References 29 publications
0
45
0
Order By: Relevance
“…Formal security notions for symmetric white-box schemes are discussed and introduced in [59,22]. In [11] it is shown how one can use the ASASA construction with injective Sboxes (where ASA stands for the affine-substitution-affine [55] construction) to instantiate white-box cryptography.…”
Section: Miscellaneous White-box Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Formal security notions for symmetric white-box schemes are discussed and introduced in [59,22]. In [11] it is shown how one can use the ASASA construction with injective Sboxes (where ASA stands for the affine-substitution-affine [55] construction) to instantiate white-box cryptography.…”
Section: Miscellaneous White-box Resultsmentioning
confidence: 99%
“…This is equivalent to a setting where one has only black-box access to the implementation. As observed by [22] this means that such a white-box implementation should resist all existing and future side-channel attacks. In this paper we explore exactly this idea and check if we can deduce information about the secret embedded in a white-box implementation by correlating key guesses to intermediate results obtained from software traces.…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…This stresses the need for further security notions dedicated to white-box cryptography. We then review some previous works on the subject and in particular the notions of unbreakability, one-wayness, incompressibility and traceability as formalised in [DLPR14].…”
Section: December 2017mentioning
confidence: 99%
“…A less ambitious goal, proposed in [DLPR13,BBK14] is that an adversary having access to the implementation of an encryption scheme may be able to encrypt (at least via code lifting), but should remain unable to decrypt. This notion is called strong white-box in [BBK14] and one-wayness in [DLPR13].…”
Section: White-box Cryptographymentioning
confidence: 99%