A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is propo...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-01-01
|
| Series: | Journal of Applied Mathematics |
| Online Access: | http://dx.doi.org/10.1155/2013/431794 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850168954359644160 |
|---|---|
| author | Yang Shi Qin Liu Qinpei Zhao |
| author_facet | Yang Shi Qin Liu Qinpei Zhao |
| author_sort | Yang Shi |
| collection | DOAJ |
| description | In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification. |
| format | Article |
| id | doaj-art-9fcc00a884ec415394abab62d4b055f0 |
| institution | OA Journals |
| issn | 1110-757X 1687-0042 |
| language | English |
| publishDate | 2013-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | Journal of Applied Mathematics |
| spelling | doaj-art-9fcc00a884ec415394abab62d4b055f02025-08-20T02:20:51ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/431794431794A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack ContextsYang Shi0Qin Liu1Qinpei Zhao2School of Software Engineering, Tongji University, Shanghai 200184, ChinaSchool of Software Engineering, Tongji University, Shanghai 200184, ChinaSchool of Software Engineering, Tongji University, Shanghai 200184, ChinaIn a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.http://dx.doi.org/10.1155/2013/431794 |
| spellingShingle | Yang Shi Qin Liu Qinpei Zhao A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts Journal of Applied Mathematics |
| title | A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts |
| title_full | A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts |
| title_fullStr | A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts |
| title_full_unstemmed | A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts |
| title_short | A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts |
| title_sort | secure implementation of a symmetric encryption algorithm in white box attack contexts |
| url | http://dx.doi.org/10.1155/2013/431794 |
| work_keys_str_mv | AT yangshi asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts AT qinliu asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts AT qinpeizhao asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts AT yangshi secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts AT qinliu secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts AT qinpeizhao secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts |