期刊文献+

白盒密码研究 被引量:10

Research on White-box Cryptography
在线阅读 下载PDF
导出
摘要 传统密码学原语的安全性基于黑盒攻击模型,在这个模型中,攻击者只能对密码学原语进行黑盒访问(即"随机预言"访问),而对程序运行时的内部状态一无所知.理论上来讲,不考虑现实生活中程序运行时各种类型的信息泄露的话,这样的假设是合理的.但实际上,一旦我们在终端运行程序时,总会发生各种信息的泄露,造成更强的攻击.白盒攻击即是这样的一种攻击,它有别于传统密码模型中定义的攻击类型,它假设攻击者对设备终端(即应用程序的运行环境)拥有完全的控制能力,能够观测并更改软件运行时的所有内部数据,攻击者具有更强的攻击能力.因此,传统黑盒模型下安全的密码学原语在白盒攻击模型下极度的脆弱,我们需要更高强度的密码体制来抵抗这种攻击.本文介绍了白盒密码的起源及相关概念,从基础理论研究和密码方案设计技术两方面总结归纳了其研究现状及发展动态,并从效率和安全性上对目前已公开的白盒密码方案进行了评价.最后,对白盒密码的应用场景和有待解决的问题进行了说明. The security of traditional cryptographic primitive is based on the black-box attack model, in this model, an adversary is given black-box(oracle) access to the functionality and has no idea about the implementation details of the software. In theory, this model is rational if we ignore the information leakage from implementations in the real-world. However, once a cryptosystem is implemented in software, information leakage always happens and will result in stronger attacks. White-box attack is one of such attacks. It is different with attacks defined in traditional cryptography, it assumes that the adversary has full control over the execution environment of application programs and has total visibility of the internal values of the software. Adversaries in white-box attack context are much stronger than in black-box attack context, therefore, traditional cryptographic primitives are fragile, secure cryptosystems are needed to resist such attacks. This paper introduces the original idea and related notions of white-box cryptography, concludes the research status and development trends of white-box basic theories and design techniques, and evaluates efficiency and security for the public white-box cryptographic schemes. Also, this paper presents the application prospects of white-box cryptography and some unresolved issues.
出处 《密码学报》 CSCD 2015年第3期258-267,共10页 Journal of Cryptologic Research
基金 国家自然科学基金(61272440 61472251) 中国博士后科学基金(2014T70417 2013M531174) 保密通信重点实验室资助项目
关键词 白盒密码 混淆 黑盒 白盒实现 软件保护 white-box cryptography obfuscation black-box white-box implementation software-protection
  • 相关文献

参考文献12

  • 1林婷婷,来学嘉.对白盒SMS4实现的一种有效攻击[J].软件学报,2013,24(9):2238-2249. 被引量:17
  • 2Dan Boneh,Richard A. DeMillo,Richard J. Lipton.On the Importance of Eliminating Errors in Cryptographic Computations[J]. Journal of Cryptology . 2001 (2)
  • 3Hohl F.Time limited blackbox security:protecting mobile Agents from malicious hosts. Mobile Agent and Security . 1998
  • 4Sander T,Tschudin CF.Protecting mobile agents against malicious hosts. Mobile Agent and Security . 1998
  • 5Paillier P.Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology,Eurocrypt’99 . 1999
  • 6Biham E,Shamir A.Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 97 . 1997
  • 7BIHAM E,SHAMIR A.Power analysis of the key scheduling of the AES candidates. The 2nd AES Candidate Conference . 1999
  • 8Chow S,Eisen P,Johnson H,et al.A white-box DES implementation for DRM applications. Digital Rights Management . 2003
  • 9Bringer J,Chabanne H,Dottax E.White box cryptography.Another attempt. IACR Cryptology ePrint Archive . 2006
  • 10R. Canetti,R. R. Dakdouk.Obfuscating point functions with multibitoutput. Advances in Cryptology Eurocrypt2005 . 2008

二级参考文献12

  • 1Anderson R, Kuhn M. Low cost attacks on tamper-resistant devices. In: Proc. of the 5th Int'l Workshop on Security Protocols. LNCS 1361, Springer-Verlag, 1997. 125-136. [doi: 10.1007/BFb0028165].
  • 2Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Proc. of the 17th Annual Int'l Cryptology Conf. on Advances in Cryptology. New York, 1997. 513-525. [doi: 10.1007/BFb0052259].
  • 3Biham E, Shamir A. Power analysis of the key scheduling of the AES candidates. In: Proc. of the 2nd AES Candidate Conf. Rome, 1999. 22-23.
  • 4Chow S, Eisen P, Johnson H, Van Oorschot PC. White-Box cryptography and an AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 2595, Newfoundland: Springer-Verlag, 2002.250-270. [doi: 10.1007/3-540-36492-7_17].
  • 5Chow S, Eisen P, Johnson H, Van Oorschot PC. A white-box DES implementation for DRM applications. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2692, Heidelberg: Springer-Vedag, 2002. 1-15. Idol: 10.1007/978-3-540-44993-5_1].
  • 6Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2696, Heidelberg: Springer-Verlag, 2002. 16-31. [doi: 10.1007/978-3-540-44993- 5_21.
  • 7Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007. 264-277. [doi: 10.1007/978-3-540- 77360-3_17].
  • 8Goubin L, Masereel JM, Quisquater M. Cryptanalysis of white box DES implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007.278-295. [doi: 10.1007/978-3-540-77360-3_18].
  • 9Billet.O, Gilbert.H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 3357, Berlin, Heidelberg: Springer-Verlag, 2005. 227-240. [doi: 10.1007/978-3-540-30564-4_16].
  • 10Michiels W, Gorissen P, Hollmann HDL. Cryptanalysis of a generic class of white-box implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 5381, Berlin, Heidelberg: Springer-Verlag, 2009.414-428. [doi: 10.1007/978-3-642-04159-4_27].

共引文献17

同被引文献60

  • 1陶启茜,马金兰.CDMA用户信息加密关键技术研究与实现方案探讨[J].电信科学,2013,29(S2):38-42. 被引量:2
  • 2陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
  • 3刘铎,戴一奇,王道顺.平稳与平衡——椭圆曲线密码体制抗旁信道攻击的策略与手段[J].计算机研究与发展,2005,42(10):1667-1672. 被引量:4
  • 4张家宏,陈建华,张丽娜.并行结构的椭圆曲线密码算法实现[J].计算机工程与设计,2007,28(23):5598-5600. 被引量:4
  • 5Halderman J A,Schoen S D,Heninger N,et al.Lest we remember:coid-boot attacks on encryption keys[J].Communications of the ACM,2009,52(5):91-98.
  • 6Hargreaves C,Chivers H.Recovery of encryption keys from memory using a linear scan[C]//Third International Conference on Availability,Reliability and Security,2008(ARES 08).IEEE,2008:1369-1376.
  • 7Tsow A.An improved recovery algorithm for decayed AES key schedule images[C]// Selected Areas in Cryptography.Springer Berlin Heidelberg,2009:215-230.
  • 8Mliller T,Freiling F C,Dewald A.TRESOR Runs Encryption Securely Outside RAM[C]// USENIX Security Symposium.2011:17-17.
  • 9Stallings W.Cryptography and Network Security;Principles and Practice[M]//Pearson Education,2002:441-471.
  • 10Chow S,Eisen P,Johnson H,et al.White-Box Cryptography and an AES Implementation[M]// Selected Areas in Cryptography Springer Berlin Heidelberg,2003:250-270.

引证文献10

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部