2021
DOI: 10.1007/s11432-020-3105-1
|View full text |Cite
|
Sign up to set email alerts
|

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix

Abstract: White-box cryptography aims to provide secure cryptographic primitives and implementations for the white-box attack model, which assumes that an adversary has full access to the implementation of the cryptographic algorithms. Real-world applications require highly efficient and secure white-box schemes, whereas the existing proposals cannot meet this demand. In this paper, we design a new white-box block cipher based on Addition/Rotation/XOR (ARX) primitives and random MDS matrix, WARX, aiming for efficient im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 54 publications
0
4
0
Order By: Relevance
“…We have 4,5,8 and 16 independent table lookups in SPNbox-32, 24, 16 and 8, respectively. As a result, we achieved 15% performance improvement compared to other available implementations [14] (parallel instruction sets were not used). While implementing the Merkle tree signature scheme, instead of producing 2N pre-images and hash-images for N-bit hash length, we preferred an optimized message mapping algorithm [15], thereby we achieved almost 50% of improvement in time and memory.…”
Section: Methodsmentioning
confidence: 86%
“…We have 4,5,8 and 16 independent table lookups in SPNbox-32, 24, 16 and 8, respectively. As a result, we achieved 15% performance improvement compared to other available implementations [14] (parallel instruction sets were not used). While implementing the Merkle tree signature scheme, instead of producing 2N pre-images and hash-images for N-bit hash length, we preferred an optimized message mapping algorithm [15], thereby we achieved almost 50% of improvement in time and memory.…”
Section: Methodsmentioning
confidence: 86%
“…For the equation system, the rank is 2 16 − 2 and there are 2 32 − 2 16 affine equivalent solutions. This attack has data, time, and memory complexities of 2 16 chosen plaintexts, 2 43.4 encryptions, and 2 21 bytes, which surpasses the previous attack whose corresponding complexities are 2 29 chosen plaintexts, 2 50.5 encryptions, and 2 29 bytes respectively.…”
Section: Conflict Of Interestmentioning
confidence: 79%
“…In recent years, dedicated white-box block ciphers appeared as a promising direction in white-box cryptography. They aim for (provable) security under both black-and whitebox models, and even (optional) resistance against sidechannel attacks in cloud scenarios [13][14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…The FPL-AES scheme in the literature [37] uses parallel lookup tables to design whiteblock ciphers with high storage cost and requires 13.75MB of storage space. The WARX scheme in literature [38] uses modulo-add, shift, heterogeneous original language and MDS matrix and WARX is more efficient than SPNbox-16 and WEM. The Yoroi-16 scheme in literature [18] enhances the security of code extraction attacks against persistent leaks by updating incompressible tables, but requires multiple lookup tables and 384KB of storage space.…”
Section: Space Occupancy Analysis and Comparisonmentioning
confidence: 99%