A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is propo...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang Shi, Qin Liu, Qinpei Zhao
Format: Article
Language:English
Published: Wiley 2013-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2013/431794
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850168954359644160
author Yang Shi
Qin Liu
Qinpei Zhao
author_facet Yang Shi
Qin Liu
Qinpei Zhao
author_sort Yang Shi
collection DOAJ
description In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.
format Article
id doaj-art-9fcc00a884ec415394abab62d4b055f0
institution OA Journals
issn 1110-757X
1687-0042
language English
publishDate 2013-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-9fcc00a884ec415394abab62d4b055f02025-08-20T02:20:51ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/431794431794A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack ContextsYang Shi0Qin Liu1Qinpei Zhao2School of Software Engineering, Tongji University, Shanghai 200184, ChinaSchool of Software Engineering, Tongji University, Shanghai 200184, ChinaSchool of Software Engineering, Tongji University, Shanghai 200184, ChinaIn a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.http://dx.doi.org/10.1155/2013/431794
spellingShingle Yang Shi
Qin Liu
Qinpei Zhao
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
Journal of Applied Mathematics
title A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
title_full A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
title_fullStr A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
title_full_unstemmed A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
title_short A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
title_sort secure implementation of a symmetric encryption algorithm in white box attack contexts
url http://dx.doi.org/10.1155/2013/431794
work_keys_str_mv AT yangshi asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts
AT qinliu asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts
AT qinpeizhao asecureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts
AT yangshi secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts
AT qinliu secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts
AT qinpeizhao secureimplementationofasymmetricencryptionalgorithminwhiteboxattackcontexts