首页> 外文OA文献 >White-Box Cryptography: Analysis of White-Box AES Implementations
【2h】

White-Box Cryptography: Analysis of White-Box AES Implementations

机译:白盒密码术:白盒AES实现的分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Cryptographic algorithms are designed to protect data or communication in the presence of an attacker. If these algorithms make use of a secret key, then their security relies on the secrecy of the key. Hence, the primary objective of an attacker typically is to extract the key. In a traditional black-box environment, the attacker has only access to the inputs and outputs of a cryptographic algorithm. However, due to the increasing demand to deploy strong cryptographic algorithms within software applications that are executed on untrusted open platforms owned and controlled by a possibly malicious party, the black-box environment becomes inadequate. Therefore, a new realistic white-box environment is introduced in which an attacker has complete access to a software implementation of a cryptographic algorithm and furthermore has full control over its execution environment. Real-world examples of a white-box environment can be found in digital content protection systems such as Digital Rights Management or Pay-TV systems, where key-instantiated cryptographic algorithms are implemented on e.g. a smartphone, tablet or set-top box. The extraction of the secret key would compromise the content protection.White-box cryptography aims to protect the confidentiality of the secret key of a cryptographic algorithm in a white-box environment. It is a technique to construct software implementations of a cryptographic algorithm that are sufficiently secure against a white-box attacker. In the academic literature, the focus has been mainly on the design of white-box implementations of block ciphers, an important subclass of symmetric-key cryptographic algorithms. In 2002, Chow, Eisen, Johnson and van Oorschot proposed the first published white-box implementation of the Advanced Encryption Standard (AES), one of the most prominent block ciphers at this time. However, two years later, Billet, Gilbert and Ech-Chatbi presented an efficient attack on this implementation, which motivated the design of three new white-box AES implementations offering more resistance against key extraction: the ones by Bringer, Chabanne and Dottax in 2006, by Xiao and Lai in 2009 and by Karroumi in 2010.This doctoral thesis covers the design and analysis of white-box implementations of block ciphers, where the main contributions address the analysis of white-box AES implementations. Starting from the initial improvement of Billet et al.’s attack proposed by Tolhuizen in 2012, we present several additional improvements considerably reducing the overall work factor. Our improved version leads to some useful observations with respect to the design choices made in Chow et al.’s white-box AES implementation. Further, this doctoral thesis describes the analysis of the three newly proposed white-box AES implementations mentioned above. First, we show how to efficiently extract equivalent keys out of Bringer et al.’s white-box AES implementation; these equivalent keys yield functionally equivalent implementations. Second, we present a practical cryptanalysis of the white-box AES implementation proposed by Xiao and Lai. The cryptanalysis uses a modified variant of the linear equivalence algorithm presented by Biryukov, De Cannière, Braeken and Preneel as a building block. Additionally, we consider design generalizations of the Xiao-Lai white-box AES implementation and their impact on our cryptanalytic result. Third, we show that Karroumi’s white-box AES implementation belongs to the class of white-box AES implementations specified by Chow et al. Consequently, Karroumi’s implementation remains vulnerable to the attack it was designed to resist, i.e., Billet et al.’s attack and our improved version of this attack.Based on the cryptanalytic results presented in this doctoral thesis and outlined above, it is shown that in early 2014 there does not exist a practical and secure white-box AES implementation published in the academic literature, even though AES is still considered to be a secure black-box block cipher. However, at the end of this thesis we discuss a new design principle proposed by Michiels and Gorissen that may lead to the construction of secure white-box AES implementations. All white-box AES implementations appeared in the academic literature so far are fixed-key; we present a new dynamic-key white-box technique that allows to update the cryptographic key in a more secure way than the known techniques.
机译:密码算法旨在在攻击者在场的情况下保护数据或通信。如果这些算法使用秘密密钥,那么它们的安全性将取决于密钥的保密性。因此,攻击者的主要目标通常是提取密钥。在传统的黑盒环境中,攻击者只能访问密码算法的输入和输出。但是,由于对在可能由恶意方拥有和控制的不受信任的开放平台上执行的软件应用程序中部署强大的加密算法的需求不断增加,黑匣子环境变得不足。因此,引入了一个新的现实白盒环境,其中攻击者可以完全访问密码算法的软件实现,并且可以完全控制其执行环境。在诸如数字版权管理或付费电视系统之类的数字内容保护系统中可以找到白盒环境的真实示例,在这些系统中,例如以密钥实现加密算法。智能手机,平板电脑或机顶盒。秘密密钥的提取将损害内容保护。白盒加密旨在在白盒环境中保护密码算法的秘密密钥的机密性。它是一种构建加密算法的软件实现的技术,该软件实现对白盒攻击者具有足够的安全性。在学术文献中,重点主要放在块密码的白盒实现设计上,块密码是对称密钥密码算法的重要子类。 2002年,Chow,Eisen,Johnson和van Oorschot提出了第一个已发布的白盒实施的高级加密标准(AES),这是当时最著名的分组密码之一。但是,两年后,Billet,Gilbert和Ech-Chatbi对这种实现提出了有效的攻击,这激发了三种新的白盒AES实现的设计,这些实现对密钥提取具有更大的抵抗力:Bringer,Chabanne和Dottax于2006年提出了这种实现。 ,分别由Xiao和Lai于2009年提出,Karroumi于2010年提出。该博士论文涵盖了块密码白盒实现的设计和分析,其中主要贡献在于对白盒AES实现的分析。从Tolhuizen在2012年提出的Billet等人的攻击的初步改进开始,我们提出了一些其他改进,从而大大降低了整体工作量。我们的改进版本针对Chow等人的白盒AES实现中的设计选择提供了一些有用的观察。此外,该博士论文描述了上述三个新提出的白盒AES实现的分析。首先,我们展示如何从Bringer等人的白盒AES实现中有效地提取等效密钥;这些等效键产生功能上等效的实现。其次,我们介绍了Xiao和Lai提出的白盒AES实现的实用密码分析。密码分析使用Biryukov,DeCannière,Braeken和Preneel提出的线性等效算法的改进变体作为构建块。此外,我们考虑了小来白盒AES实现的设计概括及其对我们的密码分析结果的影响。第三,我们证明Karroumi的白盒AES实现属于Chow等人指定的白盒AES实现。因此,Karroumi的实施仍然容易受到旨在抵抗的攻击(例如Billet等人的攻击)以及我们对该攻击的改进版本的攻击。基于本博士论文提出的密码分析结果(上文概述),证明了在2014年初,尽管AES仍然被认为是安全的黑盒分组密码,但学术文献中还没有一种实用且安全的白盒AES实现。然而,在本文的最后,我们讨论了Michiels和Gorissen提出的一种新的设计原理,该原理可能导致构建安全的白盒AES实现。到目前为止,学术文献中出现的所有白盒AES实施都是固定密钥。我们提出了一种新的动态密钥白盒技术,该技术允许以比已知技术更安全的方式更新密码密钥。

著录项

  • 作者

    De Mulder Yoni;

  • 作者单位
  • 年度 2014
  • 总页数
  • 原文格式 PDF
  • 正文语种 nl
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号