Cryptanalysis of a White Box AES Implementation

174Citations
Citations of this article
63Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The white box attack context as described in [1,2] is the common setting where cryptographic software is executed in an untrusted environment - i.e. an attacker has gained access to the implementation of cryptographic algorithms, and can observe or manipulate the dynamic execution of whole or part of the algorithms. In this paper, we present an efficient practical attack against the obfuscated AES implementation [1] proposed at SAC 2002 as a means to protect AES software operated in the white box context against key exposure. We explain in details how to extract the whole AES secret key embedded in such a white box AES implementation, with negligible memory and worst time complexity 2 30. © Springer-Verlag 2005.

Cite

CITATION STYLE

APA

Billet, O., Gilbert, H., & Ech-Chatbi, C. (2004). Cryptanalysis of a White Box AES Implementation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3357, 227–240. https://doi.org/10.1007/978-3-540-30564-4_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free