Cryptanalysis of a White Box AES Implementation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2004

AUTHORS

Olivier Billet , Henri Gilbert , Charaf Ech-Chatbi

ABSTRACT

The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—ie an attacker has gained access to the implementation of cryptographic algorithms, and can observe or manipulate the dynamic execution of whole or part of the algorithms. In this paper, we present an efficient practical attack against the obfuscated AES implementation [1] proposed at SAC 2002 as a means to protect AES software operated in the white box context against key exposure. We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 230. More... »

PAGES

227-240

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-30564-4_16

DOI

http://dx.doi.org/10.1007/978-3-540-30564-4_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1044080559


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Billet", 
        "givenName": "Olivier", 
        "id": "sg:person.011100216333.64", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011100216333.64"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Cedex 9, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ech-Chatbi", 
        "givenName": "Charaf", 
        "id": "sg:person.014620413014.20", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014620413014.20"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2004", 
    "datePublishedReg": "2004-01-01", 
    "description": "The white box attack context as described in\u00a0[1, 2] is the common setting where cryptographic software is executed in an untrusted environment\u2014ie an attacker has gained access to the implementation of cryptographic algorithms, and can observe or manipulate the dynamic execution of whole or part of the algorithms. In this paper, we present an efficient practical attack against the obfuscated AES implementation\u00a0[1] proposed at SAC\u00a02002 as a means to protect AES software operated in the white box context against key exposure. We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 230.", 
    "editor": [
      {
        "familyName": "Handschuh", 
        "givenName": "Helena", 
        "type": "Person"
      }, 
      {
        "familyName": "Hasan", 
        "givenName": "M. Anwar", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-30564-4_16", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-24327-4", 
        "978-3-540-30564-4"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "white-box AES implementation", 
      "AES implementation", 
      "white-box attack context", 
      "white-box context", 
      "AES secret key", 
      "untrusted environment", 
      "cryptographic software", 
      "cryptographic algorithms", 
      "attack context", 
      "dynamic execution", 
      "secret key", 
      "practical attacks", 
      "negligible memory", 
      "key exposure", 
      "AES software", 
      "software", 
      "implementation", 
      "algorithm", 
      "attacker", 
      "cryptanalysis", 
      "execution", 
      "common setting", 
      "attacks", 
      "key", 
      "context", 
      "access", 
      "environment", 
      "memory", 
      "detail", 
      "part", 
      "means", 
      "setting", 
      "exposure", 
      "sac", 
      "paper"
    ], 
    "name": "Cryptanalysis of a White Box AES Implementation", 
    "pagination": "227-240", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1044080559"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-30564-4_16"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-30564-4_16", 
      "https://app.dimensions.ai/details/publication/pub.1044080559"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:49", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_248.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-30564-4_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30564-4_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30564-4_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30564-4_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30564-4_16'


 

This table displays all metadata directly associated to this object as RDF triples.

117 TRIPLES      22 PREDICATES      61 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-30564-4_16 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0803
4 schema:author N5854f5a962914bba95de3e0ebbe9e154
5 schema:datePublished 2004
6 schema:datePublishedReg 2004-01-01
7 schema:description The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—ie an attacker has gained access to the implementation of cryptographic algorithms, and can observe or manipulate the dynamic execution of whole or part of the algorithms. In this paper, we present an efficient practical attack against the obfuscated AES implementation [1] proposed at SAC 2002 as a means to protect AES software operated in the white box context against key exposure. We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 230.
8 schema:editor N3f44bb25401141759a95101e3023b2d8
9 schema:genre chapter
10 schema:isAccessibleForFree true
11 schema:isPartOf N11b25c20afc04fe8978baba31aa6c1fc
12 schema:keywords AES implementation
13 AES secret key
14 AES software
15 access
16 algorithm
17 attack context
18 attacker
19 attacks
20 common setting
21 context
22 cryptanalysis
23 cryptographic algorithms
24 cryptographic software
25 detail
26 dynamic execution
27 environment
28 execution
29 exposure
30 implementation
31 key
32 key exposure
33 means
34 memory
35 negligible memory
36 paper
37 part
38 practical attacks
39 sac
40 secret key
41 setting
42 software
43 untrusted environment
44 white-box AES implementation
45 white-box attack context
46 white-box context
47 schema:name Cryptanalysis of a White Box AES Implementation
48 schema:pagination 227-240
49 schema:productId N5161efbce01c466d90cbda21d008c42b
50 Nb067affe71bc4cf7b2efc917807a5d92
51 schema:publisher N9dd41a1098574520b8b65b56f5fbed11
52 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044080559
53 https://doi.org/10.1007/978-3-540-30564-4_16
54 schema:sdDatePublished 2022-12-01T06:49
55 schema:sdLicense https://scigraph.springernature.com/explorer/license/
56 schema:sdPublisher N9b549a7eafe04b39a6872cce459ba66a
57 schema:url https://doi.org/10.1007/978-3-540-30564-4_16
58 sgo:license sg:explorer/license/
59 sgo:sdDataset chapters
60 rdf:type schema:Chapter
61 N098895c78ab94d3bb8cc7e4d6251e68f schema:familyName Handschuh
62 schema:givenName Helena
63 rdf:type schema:Person
64 N11b25c20afc04fe8978baba31aa6c1fc schema:isbn 978-3-540-24327-4
65 978-3-540-30564-4
66 schema:name Selected Areas in Cryptography
67 rdf:type schema:Book
68 N11c238d365a74e8ebdde7e6cd4433905 rdf:first sg:person.012771236207.08
69 rdf:rest N6545ea6a46a44e29a0c60ccd64dd2d29
70 N15177a33434f4c8186f4d17b4e93bb85 rdf:first N5e04aa7d68b3477fb28461474cfff3c9
71 rdf:rest rdf:nil
72 N3f44bb25401141759a95101e3023b2d8 rdf:first N098895c78ab94d3bb8cc7e4d6251e68f
73 rdf:rest N15177a33434f4c8186f4d17b4e93bb85
74 N5161efbce01c466d90cbda21d008c42b schema:name doi
75 schema:value 10.1007/978-3-540-30564-4_16
76 rdf:type schema:PropertyValue
77 N5854f5a962914bba95de3e0ebbe9e154 rdf:first sg:person.011100216333.64
78 rdf:rest N11c238d365a74e8ebdde7e6cd4433905
79 N5e04aa7d68b3477fb28461474cfff3c9 schema:familyName Hasan
80 schema:givenName M. Anwar
81 rdf:type schema:Person
82 N6545ea6a46a44e29a0c60ccd64dd2d29 rdf:first sg:person.014620413014.20
83 rdf:rest rdf:nil
84 N9b549a7eafe04b39a6872cce459ba66a schema:name Springer Nature - SN SciGraph project
85 rdf:type schema:Organization
86 N9dd41a1098574520b8b65b56f5fbed11 schema:name Springer Nature
87 rdf:type schema:Organisation
88 Nb067affe71bc4cf7b2efc917807a5d92 schema:name dimensions_id
89 schema:value pub.1044080559
90 rdf:type schema:PropertyValue
91 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
92 schema:name Information and Computing Sciences
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
95 schema:name Computation Theory and Mathematics
96 rdf:type schema:DefinedTerm
97 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
98 schema:name Computer Software
99 rdf:type schema:DefinedTerm
100 sg:person.011100216333.64 schema:affiliation grid-institutes:grid.89485.38
101 schema:familyName Billet
102 schema:givenName Olivier
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011100216333.64
104 rdf:type schema:Person
105 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
106 schema:familyName Gilbert
107 schema:givenName Henri
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
109 rdf:type schema:Person
110 sg:person.014620413014.20 schema:affiliation grid-institutes:grid.89485.38
111 schema:familyName Ech-Chatbi
112 schema:givenName Charaf
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014620413014.20
114 rdf:type schema:Person
115 grid-institutes:grid.89485.38 schema:alternateName France Télécom R&D, 38–40, rue du Général Leclerc, 92794 Cedex 9, Issy les Moulineaux, France
116 schema:name France Télécom R&D, 38–40, rue du Général Leclerc, 92794 Cedex 9, Issy les Moulineaux, France
117 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...