Nothing Special   »   [go: up one dir, main page]

Skip to main content

White-Box Cryptography

  • Reference work entry
Encyclopedia of Cryptography and Security

Related Concepts

Block Ciphers; Cryptographic Hash Functions; Rijndael; Wide Trail Design Strategy

Definition

White-Box Cryptography captures the research topic that investigates how cryptographic primitives can be implemented in software in such a way that they remain robust against attacks from the execution environment.

Background

Traditionally, cryptographic primitives are designed to protect data and keys against black-box attacks. In such a context, an adversary has knowledge of the algorithm (Kerckhoffs’ Principle) and may examine various inputs to and outputs from the system, but has no access to the internal details of the execution of a key instantiated primitive. In contrast, in many applications this context might not be compliant. In particular, on computing platforms where an adversary might have access to the memory, intercept CPU calls, or even have access to the binary software implementation of a key instantiated cryptographic primitive and deploy debuggers and...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2001) On the (Im)possibility of obfuscating programs. In: Advances in cryptology – CRYPTO 2001. Lecture notes in computer science, vol 2139. Springer, Santa Barbara, pp 1–18

    Google Scholar 

  2. Benadjila R, Billet O, Francfort S (2007) DRM to counter side channel attacks? In: Proceedings of 7th ACM workshop on digital rights management (DRM 2007). ACM Press, New York, USA, pp 23–32

    Book  Google Scholar 

  3. Billet O, Gilbert H (2003) A traceable block cipher. In: Advances in cryptology – ASIACRYPT 2003. Lecture notes in computer science, vol 2894. Springer, pp 31–346

    Google Scholar 

  4. Billet O, Gilbert H, Ech-Chatbi C Cryptanalysis of a white box AES implementation (2004) In: Proceedings of the 11th international workshop on Selected Areas in Cryptography (SAC 2004). Lecture notes in computer science, vol 3357. Springer, Heidelberg, pp 227–240

    Google Scholar 

  5. Bringer J, Chabanne H, Dottax E (2006) White box cryptography: another attempt. Cryptology ePrint Archive, Report 2006/468

    Google Scholar 

  6. Chow S, Eisen PA, Johnson H, van Oorschot PC (2002) White-box cryptography and an AES implementation. In: Proceedings of the 9th international workshop on selected areas in cryptography (SAC 2002). Lecture notes in computer science, vol 2595. Springer, Madrid, pp 250–270

    Chapter  Google Scholar 

  7. Chow S, Eisen PA, Johnson H, van Oorschot PC (2002) A white-box DES implementation for DRM applications. In: Proceedings of the ACM workshop on security and privacy in digital rights management (DRM 2002). Lecture notes in computer science, vol 2696. Springer, Washington, pp 1–15

    Google Scholar 

  8. Goubin L, Masereel JM, Quisquater M (2007) Cryptanalysis of white box DES implementations. In: Proceedings of the 14th internationalworkshop on selected areas in cryptography (SAC 2007). Lecture notes in computer science, vol 4876. Springer, Seoul, pp 278–295

    Chapter  Google Scholar 

  9. Hofheinz D, Malone-Lee J, Stam M (2007) Obfuscation for cryptographic purposes. In: Proceedings of 4th theory of cryptography conference (TCC 2007). Lecture notes in computer science, vol 4392. Springer, Amsterdam, pp 214–232

    Google Scholar 

  10. Jacob M, Boneh D, Felten EW (2002) Attacking an obfuscated cipher by injecting faults. In: Proceedings of the ACM workshop on security and privacy in digital rights management (DRM 2002). Lecture notes in computer science, vol 2696. Springer, Washington, pp 16–31

    Google Scholar 

  11. Michiels W, Gorissen P (2007) Mechanism for software tamper resistance: an application of white-box cryptography. In: Proceedings of 7th ACM workshop on digital rights management (DRM 2007). ACM Press, Alexandria, pp 82–89

    Chapter  Google Scholar 

  12. Michiels W, Gorissen P, Hollmann HDL (2008) Cryptanalysis of a generic class of white-box implementations. In: Proceedings of the 15th international workshop on selected areas in cryptography (SAC 2008). Lecture notes in computer science. Springer, Sackville

    Google Scholar 

  13. Saxena A, Wyseur B, Preneel B (2009) Towards security notions for white-box cryptography. In: Information security – 12th international conference (ISC 2009). Lecture notes in computer science. Springer, Pisa, 10 pp

    Google Scholar 

  14. Wyseur B, Michiels W, Gorissen P, Preneel B (2007) Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proceedings of the 14th international workshop on selected areas in cryptography (SAC 2007). Lecture notes in computer science, vol 4876. Springer, Seoul, pp 264–277

    Chapter  Google Scholar 

  15. Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven, Preneel B (promotor), 169+32 pp

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Wyseur, B. (2011). White-Box Cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_627

Download citation

Publish with us

Policies and ethics