首页> 外文会议>Selected areas in cryptography >Cryptanalysis of the Xiao - Lai White-Box AES Implementation
【24h】

Cryptanalysis of the Xiao - Lai White-Box AES Implementation

机译:Xiao-Lai白盒AES实现的密码分析

获取原文
获取原文并翻译 | 示例

摘要

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.'s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.'s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.'s white-box AES implementation with a work factor of about 2~(32).
机译:在白盒攻击环境中,即在不可信平台上执行密码算法的实现的情况下,对手可以完全访问实现及其执行环境。 2002年,Chow等人。提出了一种白盒AES实现,旨在防止白盒攻击上下文中的密钥提取。但是,在2004年,Billet等人。提出了对Chow等人的白盒AES实现的有效实践攻击。作为回应,在2009年,Xiao和Lai提出了一种新的白盒AES实现,据称可以抵抗Billet等人的攻击。本文介绍了Xiao等人提出的对白盒AES实现的实用密码分析。 Biryukov等人提出的线性等价算法。用作构建块。密码分析可以有效地从Xiao等人的白盒AES实现中提取AES密钥,其工作因子约为2〜(32)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号