White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Mechanism for software tamper resistance: an application of white-box cryptography
Proceedings of the 2007 ACM workshop on Digital Rights Management
An off-line dictionary attack on a simple three-party key exchange protocol
IEEE Communications Letters
Cryptanalysis of a white box AES implementation
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A PKI system for detecting the exposure of a user’s secret key
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Perturbing and protecting a traceable block cipher
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
Nowadays many information should be protected securely. Generally, they are encrypted by cryptographic algorithm. A secret value is used as encryption key which must not be exposed as public. However, the key can be extracted by adversary using white box attack. In the white box attack, the adversary is supposed to have full control of the target program's execution environment. A White-Box Cryptography is introduced to protect key from white box attack. In the previous research, white box cryptography is applied to symmetric key encryption. Although they provide protection mechanism from extracting key, they have disadvantages that are low performance and difficulty of key update. In this paper, we mentioned White-Box AES proposed by Chow et al. and improve its low performance and key update problem. We adopted composite mode using White-Box AES and Standard AES. Our scheme shows almost same performance with Standard AES and provides dynamic key approach effect. Moreover, it has a CPA-secure property and can be constructed for CCA-secure scheme with Message Authentication Code.