Abstract
AbstractThe attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes, WAS, an improved white-box cryptographic algorithm over AS iteration is proposed. This scheme utilizes the AS iterative structure to construct a lookup table with a five-layer ASASA structure, and the maximum distance separable matrix is used as a linear layer to achieve complete diffusion in a small number of rounds. Attackers can be prevented from recovering the key under black-box model. The length of nonlinear layer S and affine layer A in lookup table is 16 bits, which effectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the white-box model, while WAS possesses weak white-box (32 KB, 112)-space hardness to satisfy anti-code lifting security. WAS has provable security and better storage cost than existing schemes, with the same anti-key extraction security and anti-code lifting security, only 128 KB of memory space is required in WAS, which is only 14% of SPACE-16 algorithm and 33% of Yoroi-16 algorithm.
Funder
Beijing Natural Science Foundation
Fundamental Research Funds for the Central Universities
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference41 articles.
1. Bacher A, Bodini O, Hwang HK et al (2017) Generating random permutations by coin tossing: classical algorithms, new analysis, and modern implementation. ACM Trans Algorithms 13(2):1–43
2. Bai K, Wu C (2016) A secure white-box SM4 implementation. Secur Commun Netw 9(10):996–1006
3. Barreto P, Rijmen V (2000) The Khazad legacy-level block cipher. Primitive submitted to NESSIE 97(106)
4. Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer
5. Billet O, Gilbert H, Ech-Chatbi C (2004) Cryptanalysis of a white-box AES implementation. In: 11th International workshop on selected areas in cryptography. LNCS, vol 3357, pp 227–240. Springer, Berlin