2003
DOI: 10.1007/3-540-36492-7_17
|View full text |Cite
|
Sign up to set email alerts
|

White-Box Cryptography and an AES Implementation

Abstract: Abstract. Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how aes can be implemented as a seri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
309
0
3

Year Published

2003
2003
2018
2018

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 253 publications
(313 citation statements)
references
References 20 publications
1
309
0
3
Order By: Relevance
“…It may even be possible to design a key expansion procedure relying itself on the Russian Dolls construction with PRFs rather than PRPs. Besides, we'd like to underline that the nonexistence of short keys may be turned into an advantage in some cases, particularly in a white-box context of operation [9]. We leave this as topics for further research.…”
Section: Concrete Instantiationsmentioning
confidence: 98%
“…It may even be possible to design a key expansion procedure relying itself on the Russian Dolls construction with PRFs rather than PRPs. Besides, we'd like to underline that the nonexistence of short keys may be turned into an advantage in some cases, particularly in a white-box context of operation [9]. We leave this as topics for further research.…”
Section: Concrete Instantiationsmentioning
confidence: 98%
“…Thomas The goal of white-box cryptography, as introduced in 2002 by Chow et al, is to protect a secret key used in a cryptographic software against an adversary that has full access to the underlying execution environment [CEJvO02,CEJv03]. The basic approach is to design an obfuscated cryptographic implementation embedding the key so that, even for such a powerful adversary, key recovery is made difficult.…”
Section: December 2017mentioning
confidence: 99%
“…Concrete implementations of whitebox cryptography make of secret tables much smaller than the codebook [7]. This solution is attractive in hardware also, since EEPROM memories are much more difficult to read by invasive means than RAM or ROM.…”
Section: Whitebox Cryptographymentioning
confidence: 99%