Protecting white-box AES with dual ciphers

83Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to protect AES software running on untrusted platforms, Chow et al. (2002) designed a white-box implementation. However, Billet et al. (2004) showed that the secret key can be extracted with a time complexity of 2 30. In this paper, we present an improved white-box implementation of AES. We use dual ciphers to modify the state and key representations in each round as well as two of the four classical AES operations, SubBytes and MixColumns. We show that, with 61200 possible dual ciphers the complexity of Billet et al. attack is raised to 291. Interestingly, our white-box implementation does not require more memory space than that of Chow et al. implementation. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Karroumi, M. (2011). Protecting white-box AES with dual ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6829 LNCS, pp. 278–291). https://doi.org/10.1007/978-3-642-24209-0_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free