2018
DOI: 10.46586/tches.v2018.i3.121-149
|View full text |Cite
|
Sign up to set email alerts
|

On Recovering Affine Encodings in White-Box Implementations

Abstract: Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure white-box implementation of AES has remained an enduring challenge. Following the footsteps of the original proposal by Chow et al., other constructions were later built around the same framework. In this framework, the round function of the cipher is “encoded” by composing it with non-linear and affine layers known as encodings. However, all such attempts were broken by a series of increasingly efficient attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…(3) in polynomial time [19]; or (3) if S is composed of small m s -bit S-boxes, the algorithm by Derbez et al can solve Eqn. (4) in about O(2 2ms ) [17].…”
Section: Reducing Implicit Implementations To Self-equivalence Implem...mentioning
confidence: 96%
See 2 more Smart Citations
“…(3) in polynomial time [19]; or (3) if S is composed of small m s -bit S-boxes, the algorithm by Derbez et al can solve Eqn. (4) in about O(2 2ms ) [17].…”
Section: Reducing Implicit Implementations To Self-equivalence Implem...mentioning
confidence: 96%
“…The first generic attack that we will consider is the reduction subroutine that transforms the encodings of a CEJO implementation to selfequivalence encodings. This subroutine was proposed in [34] and combines the three generic CEJO attacks proposed in [3,17,29]; showing that the reduction subroutine does not succeed implies that neither the three generic CEJO attacks do.…”
Section: Previous Generic Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…We will now use the method from [DFLM18] to partially recover the outer affine maps on the left branch. The idea is to query a fixed random input difference on the left branch and no difference on the right branch (possible due to the previous step), and to compute the dimension of the space of the observed output differences.…”
Section: Triangularization Of the Outer Affine Maps (Left Branches)mentioning
confidence: 99%
“…However, the existing white-box schemes cannot meet these requirements. Since 2002, a number of white-box implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) have been proposed [1][2][3][4][5], but their security was penetrated [6][7][8][9][10][11][12]. At present, there are no recognized secure white-box implementations of DES/AES.…”
Section: Introductionmentioning
confidence: 99%