Cryptanalysis of the Xiao – Lai White-Box AES Implementation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Yoni De Mulder , Peter Roelse , Bart Preneel

ABSTRACT

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232. More... »

PAGES

34-49

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3

DOI

http://dx.doi.org/10.1007/978-3-642-35999-6_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1040755097


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/16", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Studies in Human Society", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1699", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Other Studies In Human Society", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "De Mulder", 
        "givenName": "Yoni", 
        "id": "sg:person.014375742011.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014375742011.82"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Roelse", 
        "givenName": "Peter", 
        "id": "sg:person.07631674727.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07631674727.92"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.\u2019s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.\u2019s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.\u2019s white-box AES implementation with a work factor of about 232.", 
    "editor": [
      {
        "familyName": "Knudsen", 
        "givenName": "Lars R.", 
        "type": "Person"
      }, 
      {
        "familyName": "Wu", 
        "givenName": "Huapeng", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-35999-6_3", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-35998-9", 
        "978-3-642-35999-6"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "Xiao et al", 
      "AES implementation", 
      "al", 
      "et al", 
      "implementation", 
      "algorithm", 
      "building blocks", 
      "platform", 
      "Billet et al", 
      "white-box attack context", 
      "attack context", 
      "environment", 
      "equivalence algorithm", 
      "block", 
      "cryptographic algorithms", 
      "full access", 
      "Chow et al", 
      "attacks", 
      "LAI", 
      "key", 
      "execution environment", 
      "response", 
      "AES key", 
      "factors", 
      "context", 
      "practical attacks", 
      "Xiao", 
      "work factors", 
      "adversary", 
      "access", 
      "whites", 
      "setting", 
      "paper", 
      "cryptanalysis", 
      "Biryukov", 
      "white-box AES implementation", 
      "untrusted platforms", 
      "Practical Cryptanalysis"
    ], 
    "name": "Cryptanalysis of the Xiao \u2013 Lai White-Box AES Implementation", 
    "pagination": "34-49", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1040755097"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-35999-6_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-35999-6_3", 
      "https://app.dimensions.ai/details/publication/pub.1040755097"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_425.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-35999-6_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35999-6_3'


 

This table displays all metadata directly associated to this object as RDF triples.

119 TRIPLES      22 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-35999-6_3 schema:about anzsrc-for:16
2 anzsrc-for:1699
3 schema:author N598ab58348c8432cbab78ad38d7cc22f
4 schema:datePublished 2013
5 schema:datePublishedReg 2013-01-01
6 schema:description In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232.
7 schema:editor N5102f89f424c4a6e931feafe62a72fa9
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N85fafedc6ad04e2287f804cc7e02e935
11 schema:keywords AES implementation
12 AES key
13 Billet et al
14 Biryukov
15 Chow et al
16 LAI
17 Practical Cryptanalysis
18 Xiao
19 Xiao et al
20 access
21 adversary
22 al
23 algorithm
24 attack context
25 attacks
26 block
27 building blocks
28 context
29 cryptanalysis
30 cryptographic algorithms
31 environment
32 equivalence algorithm
33 et al
34 execution environment
35 factors
36 full access
37 implementation
38 key
39 paper
40 platform
41 practical attacks
42 response
43 setting
44 untrusted platforms
45 white-box AES implementation
46 white-box attack context
47 whites
48 work factors
49 schema:name Cryptanalysis of the Xiao – Lai White-Box AES Implementation
50 schema:pagination 34-49
51 schema:productId N02c0793d438b4b26bed3ad8a26320b99
52 N46cb5d990d394858aa40ba7d9524e611
53 schema:publisher N1eee6247e8614244873963cd433a3504
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040755097
55 https://doi.org/10.1007/978-3-642-35999-6_3
56 schema:sdDatePublished 2022-10-01T06:59
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N27bd328838d54669ad1d3de7a5bdd8e9
59 schema:url https://doi.org/10.1007/978-3-642-35999-6_3
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N02c0793d438b4b26bed3ad8a26320b99 schema:name doi
64 schema:value 10.1007/978-3-642-35999-6_3
65 rdf:type schema:PropertyValue
66 N03222ccf22a2477fa61b5a4ba87d63c0 rdf:first sg:person.011115044357.39
67 rdf:rest rdf:nil
68 N1eee6247e8614244873963cd433a3504 schema:name Springer Nature
69 rdf:type schema:Organisation
70 N27bd328838d54669ad1d3de7a5bdd8e9 schema:name Springer Nature - SN SciGraph project
71 rdf:type schema:Organization
72 N46cb5d990d394858aa40ba7d9524e611 schema:name dimensions_id
73 schema:value pub.1040755097
74 rdf:type schema:PropertyValue
75 N5102f89f424c4a6e931feafe62a72fa9 rdf:first N8ddecd84bfe647be8ab056b516815bdb
76 rdf:rest Nb27d010ce0794a9684dc8a96beae0899
77 N598ab58348c8432cbab78ad38d7cc22f rdf:first sg:person.014375742011.82
78 rdf:rest N734f0f660feb44cd8d0ec38a6876ebd9
79 N734f0f660feb44cd8d0ec38a6876ebd9 rdf:first sg:person.07631674727.92
80 rdf:rest N03222ccf22a2477fa61b5a4ba87d63c0
81 N795839d40694451a8edde22cef126f0e schema:familyName Wu
82 schema:givenName Huapeng
83 rdf:type schema:Person
84 N85fafedc6ad04e2287f804cc7e02e935 schema:isbn 978-3-642-35998-9
85 978-3-642-35999-6
86 schema:name Selected Areas in Cryptography
87 rdf:type schema:Book
88 N8ddecd84bfe647be8ab056b516815bdb schema:familyName Knudsen
89 schema:givenName Lars R.
90 rdf:type schema:Person
91 Nb27d010ce0794a9684dc8a96beae0899 rdf:first N795839d40694451a8edde22cef126f0e
92 rdf:rest rdf:nil
93 anzsrc-for:16 schema:inDefinedTermSet anzsrc-for:
94 schema:name Studies in Human Society
95 rdf:type schema:DefinedTerm
96 anzsrc-for:1699 schema:inDefinedTermSet anzsrc-for:
97 schema:name Other Studies In Human Society
98 rdf:type schema:DefinedTerm
99 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
100 schema:familyName Preneel
101 schema:givenName Bart
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
103 rdf:type schema:Person
104 sg:person.014375742011.82 schema:affiliation grid-institutes:grid.5596.f
105 schema:familyName De Mulder
106 schema:givenName Yoni
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014375742011.82
108 rdf:type schema:Person
109 sg:person.07631674727.92 schema:affiliation grid-institutes:None
110 schema:familyName Roelse
111 schema:givenName Peter
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07631674727.92
113 rdf:type schema:Person
114 grid-institutes:None schema:alternateName Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands
115 schema:name Irdeto B.V., Taurus Avenue 105, 2132 LS, Hoofddorp, The Netherlands
116 rdf:type schema:Organization
117 grid-institutes:grid.5596.f schema:alternateName Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium
118 schema:name Dept. Elect. Eng.-ESAT/SCD-COSIC and IBBT, KU Leuven, Kasteelpark Arenberg 10, 3001, Heverlee, Belgium
119 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...