Cryptanalysis of the Xiao – Lai White-Box AES Implementation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Yoni De Mulder , Peter Roelse , Bart Preneel

ABSTRACT

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232. More... »

PAGES

34-49

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3

DOI

http://dx.doi.org/10.1007/978-3-642-35999-6_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1040755097


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/16", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Studies in Human Society", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1699", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Other Studies In Human Society", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "De Mulder", 
        "givenName": "Yoni", 
        "id": "sg:person.014375742011.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014375742011.82"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Roelse", 
        "givenName": "Peter", 
        "id": "sg:person.07631674727.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07631674727.92"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.\u2019s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.\u2019s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.\u2019s white-box AES implementation with a work factor of about 232.", 
    "editor": [
      {
        "familyName": "Knudsen", 
        "givenName": "Lars R.", 
        "type": "Person"
      }, 
      {
        "familyName": "Wu", 
        "givenName": "Huapeng", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-35999-6_3", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-35998-9", 
        "978-3-642-35999-6"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "Xiao et al", 
      "AES implementation", 
      "al", 
      "et al", 
      "implementation", 
      "algorithm", 
      "building blocks", 
      "platform", 
      "Billet et al", 
      "white-box attack context", 
      "attack context", 
      "environment", 
      "equivalence algorithm", 
      "block", 
      "cryptographic algorithms", 
      "full access", 
      "Chow et al", 
      "attacks", 
      "LAI", 
      "key", 
      "execution environment", 
      "response", 
      "AES key", 
      "factors", 
      "context", 
      "practical attacks", 
      "Xiao", 
      "work factors", 
      "adversary", 
      "access", 
      "whites", 
      "setting", 
      "paper", 
      "cryptanalysis", 
      "Biryukov", 
      "white-box AES implementation", 
      "untrusted platforms", 
      "Practical Cryptanalysis"
    ], 
    "name": "Cryptanalysis of the Xiao \u2013 Lai White-Box AES Implementation", 
    "pagination": "34-49", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1040755097"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-35999-6_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-35999-6_3", 
      "https://app.dimensions.ai/details/publication/pub.1040755097"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:53", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_4.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-35999-6_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'


 

This table displays all metadata directly associated to this object as RDF triples.

119 TRIPLES      22 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-35999-6_3 schema:about anzsrc-for:16
2 anzsrc-for:1699
3 schema:author N39c4027e5cf94fc682e524f113512e05
4 schema:datePublished 2013
5 schema:datePublishedReg 2013-01-01
6 schema:description In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232.
7 schema:editor N10a41896bdcd492f811630eb7ae41153
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nbadede4410ae4d79b09697e5a5251af3
11 schema:keywords AES implementation
12 AES key
13 Billet et al
14 Biryukov
15 Chow et al
16 LAI
17 Practical Cryptanalysis
18 Xiao
19 Xiao et al
20 access
21 adversary
22 al
23 algorithm
24 attack context
25 attacks
26 block
27 building blocks
28 context
29 cryptanalysis
30 cryptographic algorithms
31 environment
32 equivalence algorithm
33 et al
34 execution environment
35 factors
36 full access
37 implementation
38 key
39 paper
40 platform
41 practical attacks
42 response
43 setting
44 untrusted platforms
45 white-box AES implementation
46 white-box attack context
47 whites
48 work factors
49 schema:name Cryptanalysis of the Xiao – Lai White-Box AES Implementation
50 schema:pagination 34-49
51 schema:productId N13966539773a45798e6978e3925acd41
52 N49a30b49ffba4fd58775bca8b7f44810
53 schema:publisher Nc7f549b2fbbf4388b9a6fcc584ea18ac
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040755097
55 https://doi.org/10.1007/978-3-642-35999-6_3
56 schema:sdDatePublished 2022-12-01T06:53
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N454f8e25a7f547b1a4d3310d4c682ddd
59 schema:url https://doi.org/10.1007/978-3-642-35999-6_3
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N0891c0d91ea642a98adb5d97ce158f14 schema:familyName Wu
64 schema:givenName Huapeng
65 rdf:type schema:Person
66 N10a41896bdcd492f811630eb7ae41153 rdf:first Ndfbf64e5e1a042cd86fde0f6acc5c9d9
67 rdf:rest N23611bf8d7654ba0a61e314f2d399cd3
68 N13966539773a45798e6978e3925acd41 schema:name doi
69 schema:value 10.1007/978-3-642-35999-6_3
70 rdf:type schema:PropertyValue
71 N21cc39f8df1547b09266ae2b20cdf00a rdf:first sg:person.07631674727.92
72 rdf:rest N9898f7ba64f84390ae610867e362ac75
73 N23611bf8d7654ba0a61e314f2d399cd3 rdf:first N0891c0d91ea642a98adb5d97ce158f14
74 rdf:rest rdf:nil
75 N39c4027e5cf94fc682e524f113512e05 rdf:first sg:person.014375742011.82
76 rdf:rest N21cc39f8df1547b09266ae2b20cdf00a
77 N454f8e25a7f547b1a4d3310d4c682ddd schema:name Springer Nature - SN SciGraph project
78 rdf:type schema:Organization
79 N49a30b49ffba4fd58775bca8b7f44810 schema:name dimensions_id
80 schema:value pub.1040755097
81 rdf:type schema:PropertyValue
82 N9898f7ba64f84390ae610867e362ac75 rdf:first sg:person.011115044357.39
83 rdf:rest rdf:nil
84 Nbadede4410ae4d79b09697e5a5251af3 schema:isbn 978-3-642-35998-9
85 978-3-642-35999-6
86 schema:name Selected Areas in Cryptography
87 rdf:type schema:Book
88 Nc7f549b2fbbf4388b9a6fcc584ea18ac schema:name Springer Nature
89 rdf:type schema:Organisation
90 Ndfbf64e5e1a042cd86fde0f6acc5c9d9 schema:familyName Knudsen
91 schema:givenName Lars R.
92 rdf:type schema:Person
93 anzsrc-for:16 schema:inDefinedTermSet anzsrc-for:
94 schema:name Studies in Human Society
95 rdf:type schema:DefinedTerm
96 anzsrc-for:1699 schema:inDefinedTermSet anzsrc-for:
97 schema:name Other Studies In Human Society
98 rdf:type schema:DefinedTerm
99 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
100 schema:familyName Preneel
101 schema:givenName Bart
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
103 rdf:type schema:Person
104 sg:person.014375742011.82 schema:affiliation grid-institutes:grid.5596.f
105 schema:familyName De Mulder
106 schema:givenName Yoni
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014375742011.82
108 rdf:type schema:Person
109 sg:person.07631674727.92 schema:affiliation grid-institutes:None
110 schema:familyName Roelse
111 schema:givenName Peter
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07631674727.92
113 rdf:type schema:Person
114 grid-institutes:None schema:alternateName Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands
115 schema:name Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands
116 rdf:type schema:Organization
117 grid-institutes:grid.5596.f schema:alternateName Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium
118 schema:name Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium
119 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...