White-box Implementation of Stream Cipher

Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto

Abstract

White-box cryptography is a software obfuscation technique for cryptography implementation. It can protect the secret key even if an attacker has full access and control over the cryptosystem implementation and its execution platform. There have been several proposals for a white-box implementation of cryptography. We propose a white-box implementation of a stream cipher that can achieve the same asymptotic performance as the standard implementation. Our black-box implementation of KCipher-2 achieves low storage consumption of no more than 2 megabytes and is suitable for a PC, tablet, and smartphone. On the other hand, we can achieve space hard implementation to protect against a code-lifting attack. Furthermore, the implementation can protect against black-box attacks and a BGE attack.

References

  1. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., and Yang, K. (2001). On the (Im)possibility of Obfuscating Programs. In Proc. of Advances in Cryptology (CRYPTO 2001), Lecture Notes in Computer Science 2139, pages 1-18.
  2. Billet, O., Gilbert, H., and Ech-chatbi, C. (2005). Cryptanalysis of a White Box AES Implementation. In Proc. of Selected Areas in Cryptography (SAC 2014), Lecture Notes in Computer Science 3357, pages 227- 240.
  3. Biryukov, A., Bouillaguet, C., and Khovratovich, D. (2014). Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key. In Advances in Cryptology (ASIACRYPT 2014), Lecture Notes in Computer Science 8873, pages 63-84.
  4. Bogdanov, A. and Isobe, T. (2015). White-Box Cryptography Revisited: Space-Hard Ciphers. In Proc. of ACM Conference on Computer and Communications Security (ACM CCS 2015), pages 1058-1069.
  5. Bos, J. W., Hubain, C., Michiels, W., and Teuwen, P. (2015). Differential Computation Analysis: Hiding your White-Box Designs is Not Enough. https://eprint.iacr.org/2015/753.
  6. Bringer, J., Chabanne, H., and Dottax, E. (2006a). Perturbing and Protecting a Traceable Block Cipher. In Proc. of IFIP Open Conference on Communications and Multimedia Security, Lecture Notes in Computer Science 4237, pages 109-119.
  7. Bringer, J., Chabanne, H., and Dottax, E. (2006b). White Box Cryptography: Another Attempt.
  8. Cho, J., Choi, K. Y., and Moon, D. (2016). Hybrid WBC : Secure and efficient encryption schemes using the White-Box Cryptography. https://eprint.iacr.org/2016/679.
  9. Chow, S., Eisen, P., Johnson, H., and Van Oorschot, P. C. (2003a). A White-Box DES Implementation for DRM Applications. In Proc. of ACM Workshop on Digital Rights Management (DRM 2002), Lecture Notes in Computer Science 2696, pages 1-15.
  10. Chow, S., Eisen, P. a., Johnson, H., Van Oorschot, P. C., and Oorschot, P. C. V. (2003b). White-box Cryptography and an AES Implementation. In Proc. of Selected Areas in Cryptography (SAC 2002), Lecture Notes in Computer Science 2595, pages 250-270.
  11. Collberg, C., Thomborson, C., and Low, D. (1997). A Taxonomy of Obfuscating Transformations. Technical Report 148, Department of Computer Science University of Auckland.
  12. Daemen, J. and Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard . Springer.
  13. Fouque, P.-a., Karpman, P., Kirchner, P., and Minaud, B. (2016). Efficient and Provable White-Box Primitives. https://eprint.iacr.org/2016/642.
  14. Goldwasser, S. and Kalai, Y. T. (2005). On the Impossibility of Obfuscation with Auxiliary. In Proc. of 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS2005), pages 553-562.
  15. Goldwasser, S. and Rothblum, G. N. (2007). On BestPossible Obfuscation. In Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392, pages 194-213.
  16. Hada, S. and Sakurai, K. (2007). A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. In Proc. of International Workshop on Security (IWSEC2007), Lecture Notes in Computer Science 4752, pages 1-12.
  17. Hofheinz, D., Malone-Lee, J., and Stam, M. (2007). Obfuscation for Cryptographic Purposes. In Proc. of Fourth IACR Theory of Cryptography Conference (TCC2007), Lecture Notes in Computer Science 4392, pages 214-232.
  18. Karroumi, M. (2010). Protecting White-Box AES with Dual Ciphers. In Proc. of Information Security and Cryptology (ICISC 2010), Lecture Notes in Computer Science 6829, pages 278-291.
  19. Kiyomoto, S., Tanaka, T., and Sakurai, K. (2007). K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In Proc. of Secrypt 2007, pages 204-213.
  20. Klinec, D. (2013). White-box attack resistant cryptography. PhD thesis, Faculty of Informatics, Masaryk University.
  21. Kocher, P. C. (1996). Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. of Advances in Cryptology (CRYPTO 1996), Lecture Notes in Computer Scicence 1109, pages 104- 113.
  22. Muir, J. a. (2013). A Tutorial on White-box AES. Advances in Network Analysis and its Applications, Mathematics in Industry, 18:209-229.
  23. Mulder, Y. D., Roelse, P., and Preneel, B. (2013). Cryptanalysis of the XiaoLai White-Box AES Implementation. In Proc. of Selected Areas in Cryptography (SAC 2012), Lecture Notes in Computer Science 7707, volume Lecture No, pages 34-49.
  24. Mulder, Y. D., Wyseur, B., and Preneel, B. (2010). Cryptanalysis of a Perturbated White-Box AES Implementation. In Proc. of Progress in Cryptology (INDOCRYPT 2010), Lecture Notes in Computer Science 6498, pages 292-310.
  25. Sasdrich, P., Moradi, A., and Güneysu, T. (2016). White-Box Cryptography in the Gray Box A Hardware Implementation and its Side Channels . https://eprint.iacr.org/2016/203.
  26. Saxena, A., Wyseur, B., and Preneel, B. (2009). Towards Security Notions for White-Box Cryptography. In Proc. of Information Security Conference (ISC 2009), Lecture Notes in Computer Science 5735, pages 49- 58.
  27. Xiao, Y. and Lai, X. (2009). A Secure Implementation of White-Box AES. In Proc. of International Conference on Computer Science and its Applications (CSA 2009), pages 1-6.
Download


Paper Citation


in Harvard Style

Fukushima K., Hidano S. and Kiyomoto S. (2017). White-box Implementation of Stream Cipher . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 263-269. DOI: 10.5220/0006115202630269


in Bibtex Style

@conference{icissp17,
author={Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto},
title={White-box Implementation of Stream Cipher},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={263-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006115202630269},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - White-box Implementation of Stream Cipher
SN - 978-989-758-209-7
AU - Fukushima K.
AU - Hidano S.
AU - Kiyomoto S.
PY - 2017
SP - 263
EP - 269
DO - 10.5220/0006115202630269