The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2010 vol.8)
pp: 64-67
Wil Michiels , Philips Research Laboratories
ABSTRACT
White-box cryptography is the discipline of implementing a cryptographic algorithm in software such that an adversary will have difficulty extracting the cryptographic key. This approach assumes that the adversary has full access to and full control over the implementation's execution. White-box implementations can provide good protection when combined with other security measures.
INDEX TERMS
cryptography, black-box cryptography, gray-box cryptography, white-box cryptography, security & privacy, crypto corner
CITATION
Wil Michiels, "Opportunities in White-Box Cryptography", IEEE Security & Privacy, vol.8, no. 1, pp. 64-67, January/February 2010, doi:10.1109/MSP.2010.44
REFERENCES
1. S. Chow et al., "White-Box Cryptography and an AES Implementation," Proc. 9th Ann. Workshop Selected Areas in Cryptography (SAC 02), LNCS 2595, Springer, 2002, pp. 250–270.
2. S. Chow et al., "White-Box DES Implementation for DRM Applications," Proc. 2nd ACM Workshop Digital Rights Management, LNCS 2696, Springer, 2002, pp. 1–15.
3. H.E. Link and W.D. Neumann, "Clarifying Obfuscation: Improving the Security of White-Box DES," Proc. Int'l Symp. Information Technology: Coding and Computing, IEEE CS Press, 2005, pp. 679–684.
4. O. Billet, H. Gilbert, and C. Ech-Chatbi, "Cryptanalysis of a White-Box AES Implementation," Proc. 11th Ann. Workshop Selected Areas in Cryptography (SAC 04), LNCS 3357, Springer, 2004, pp. 227–240.
5. L. Goubin, J.M. Masereel, and M. Quisquater, "Cryptanalysis of White Box DES Implementations," Proc. 14th Ann. Workshop Selected Areas in Cryptography (SAC 07), LNCS 4876, Springer, 2007, pp. 278–295.
6. M. Jacob, D. Boneh, and E. Felten, "Attacking an Obfuscated Cipher by Injecting Faults," Proc. Digital Rights Management Workshop, LNCS 2696, Springer, 2002, pp. 16–31.
7. W. Michiels, P. Gorissen, and H.D.L. Hollmann, "Cryptanalysis of a Generic Class of White-Box Implementations," Proc. 15th Ann. Workshop Selected Areas in Cryptography (SAC 08), LNCS 5381, Springer, 2009, pp. 392–406.
8. B. Wyseur et al., "Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings," Proc. 14th Ann. Workshop Selected Areas in Cryptography (SAC 07), LNCS 4876, Springer, 2007, pp. 264–277.
9. W. Michiels, "A New White-Box Technique," white paper, 2009; available from author at wil.michiels@philips.com.
10. C. Collberg and J. Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison-Wesley, 2009.
11. W. Michiels and P. Gorissen, "Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography," Proc. 7th ACM Workshop Digital Rights Management, ACM Press, 2007, pp. 82–89.
12. M. Joye, "On White-Box Cryptography," Proc. 1st Int'l Conf. Security of Information and Networks (SIN 07), Trafford Publishing, 2008, pp. 7–12.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool