Related Concepts
Block Ciphers; Cryptographic Hash Functions; Rijndael; Wide Trail Design Strategy
Definition
White-Box Cryptography captures the research topic that investigates how cryptographic primitives can be implemented in software in such a way that they remain robust against attacks from the execution environment.
Background
Traditionally, cryptographic primitives are designed to protect data and keys against black-box attacks. In such a context, an adversary has knowledge of the algorithm (Kerckhoffs’ Principle) and may examine various inputs to and outputs from the system, but has no access to the internal details of the execution of a key instantiated primitive. In contrast, in many applications this context might not be compliant. In particular, on computing platforms where an adversary might have access to the memory, intercept CPU calls, or even have access to the binary software implementation of a key instantiated cryptographic primitive and deploy debuggers and...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2001) On the (Im)possibility of obfuscating programs. In: Advances in cryptology – CRYPTO 2001. Lecture notes in computer science, vol 2139. Springer, Santa Barbara, pp 1–18
Benadjila R, Billet O, Francfort S (2007) DRM to counter side channel attacks? In: Proceedings of 7th ACM workshop on digital rights management (DRM 2007). ACM Press, New York, USA, pp 23–32
Billet O, Gilbert H (2003) A traceable block cipher. In: Advances in cryptology – ASIACRYPT 2003. Lecture notes in computer science, vol 2894. Springer, pp 31–346
Billet O, Gilbert H, Ech-Chatbi C Cryptanalysis of a white box AES implementation (2004) In: Proceedings of the 11th international workshop on Selected Areas in Cryptography (SAC 2004). Lecture notes in computer science, vol 3357. Springer, Heidelberg, pp 227–240
Bringer J, Chabanne H, Dottax E (2006) White box cryptography: another attempt. Cryptology ePrint Archive, Report 2006/468
Chow S, Eisen PA, Johnson H, van Oorschot PC (2002) White-box cryptography and an AES implementation. In: Proceedings of the 9th international workshop on selected areas in cryptography (SAC 2002). Lecture notes in computer science, vol 2595. Springer, Madrid, pp 250–270
Chow S, Eisen PA, Johnson H, van Oorschot PC (2002) A white-box DES implementation for DRM applications. In: Proceedings of the ACM workshop on security and privacy in digital rights management (DRM 2002). Lecture notes in computer science, vol 2696. Springer, Washington, pp 1–15
Goubin L, Masereel JM, Quisquater M (2007) Cryptanalysis of white box DES implementations. In: Proceedings of the 14th internationalworkshop on selected areas in cryptography (SAC 2007). Lecture notes in computer science, vol 4876. Springer, Seoul, pp 278–295
Hofheinz D, Malone-Lee J, Stam M (2007) Obfuscation for cryptographic purposes. In: Proceedings of 4th theory of cryptography conference (TCC 2007). Lecture notes in computer science, vol 4392. Springer, Amsterdam, pp 214–232
Jacob M, Boneh D, Felten EW (2002) Attacking an obfuscated cipher by injecting faults. In: Proceedings of the ACM workshop on security and privacy in digital rights management (DRM 2002). Lecture notes in computer science, vol 2696. Springer, Washington, pp 16–31
Michiels W, Gorissen P (2007) Mechanism for software tamper resistance: an application of white-box cryptography. In: Proceedings of 7th ACM workshop on digital rights management (DRM 2007). ACM Press, Alexandria, pp 82–89
Michiels W, Gorissen P, Hollmann HDL (2008) Cryptanalysis of a generic class of white-box implementations. In: Proceedings of the 15th international workshop on selected areas in cryptography (SAC 2008). Lecture notes in computer science. Springer, Sackville
Saxena A, Wyseur B, Preneel B (2009) Towards security notions for white-box cryptography. In: Information security – 12th international conference (ISC 2009). Lecture notes in computer science. Springer, Pisa, 10 pp
Wyseur B, Michiels W, Gorissen P, Preneel B (2007) Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proceedings of the 14th international workshop on selected areas in cryptography (SAC 2007). Lecture notes in computer science, vol 4876. Springer, Seoul, pp 264–277
Wyseur B (2009) White-box cryptography. Ph.D. thesis, Katholieke Universiteit Leuven, Preneel B (promotor), 169+32 pp
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Wyseur, B. (2011). White-Box Cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_627
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_627
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering