logo

SCIENCE CHINA Information Sciences, Volume 63, Issue 3: 139106(2020) https://doi.org/10.1007/s11432-019-9883-9

Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography

More info
  • ReceivedMar 3, 2019
  • AcceptedApr 18, 2019
  • PublishedFeb 10, 2020

Abstract

There is no abstract available for this article.


References

[1] Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250--270. Google Scholar

[2] Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227--240. Google Scholar

[3] Xu T, Wu C, Liu F. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci China Inf Sci, 2018, 61: 039103 CrossRef Google Scholar

[4] Biryukov A, Shamir A. Structural cryptanalysis of SASAS. In: Proceedings of Eurocrypt 2001. Berlin: Springer, 2001. 395--405. Google Scholar

[5] Baek C H, Cheon J H, Hong H. White-box AES implementation revisited. J Commun Netw, 2016, 18: 273-287 CrossRef Google Scholar

[6] Lepoint T, Rivain M, de Mulder Y, et al. Two attacks on a white-box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2014. 265--285. Google Scholar

  • Figure 1

    (Color online) Table implementations of LTG and KLTG, all of which have the same structure. The position for KLTG can be found by the distinguisher for SAS and SASAS structures.

  •   

    Algorithm 1 Round boundary detection algorithm

    Require: Whitebox implementation of

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1