Sommaire

  • Cet exposé a été présenté le 25 avril 2014.

Description

  • Orateur

    Yoni De Mulder - University of Leuven

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a cryptographic algorithm. For example, the adversary can make use of widely available tools such as disassemblers and debuggers with breakpoint functionality. An example of a white-box environment is a digital content protection system in which the client is implemented in software and executed on a PC, tablet, set-top box or a mobile phone. A malicious end-user may attempt to extract a secret key used for content decryption from the software. Next, the end-user may distribute this key to non-entitled end-users, or the end-user may use this key to decrypt the content directly, circumventing content usage rules. White-box cryptography aims to protect the confidentiality of the secret key of a cryptographic algorithm in a white-box environment. In particular, it is a technique to construct software implementations of a cryptographic algorithm that are sufficiently secure against a white-box attacker. These implementations are referred to as white-box implementations.<br/> In this talk, we elaborate on white-box cryptography in general (e.g., what are the main white-box security objectives and the typical attacker¿s goals in the white-box environment) and we discuss its application to AES. We start with the design of the first published white-box AES implementation by Chow et al. in 2002, and the efficient attack on this implementation by Billet et al. in 2004. Next, we discuss the design of two new white-box AES implementations claimed to be resistant against Billet et al.¿s attack, and we present practical attacks showing that none of these proposed countermeasures actually achieve white-box security. To conclude, we discuss a novel white-box technique proposed by Michiels and Gorissen in 2010 and share some thoughts about the future of white-box cryptography.

Prochains exposés

  • SoK: Security of the Ascon Modes

    • 20 juin 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Charlotte Lefevre - Radboud University

    The Ascon authenticated encryption scheme and hash function of Dobraunig et al (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE) resembles ideas of SpongeWrap, but not quite, and various works have investigated the generic security of Ascon-AE, all covering different attack[…]
  • Comprehensive Modelling of Power Noise via Gaussian Processes with Applications to True Random Number Generators

    • 27 juin 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Maciej Skorski - Laboratoire Hubert Curien

    The talk examines power noise modelling through Gaussian Processes for secure True Random Number Generators.   While revisiting one-sided fractional Brownian motion, we obtain novel contributions by quantifying posterior uncertainty in exact analytical form, establishing quasi-stationary properties, and developing rigorous time-frequency analysis. These results are applied to model oscillator[…]
    • Cryptography

    • TRNG

  • CryptoVerif: a computationally-sound security protocol verifier

    • 05 septembre 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Bruno Blanchet - Inria

    CryptoVerif is a security protocol verifier sound in the computational model of cryptography. It produces proofs by sequences of games, like those done manually by cryptographers. It has an automatic proof strategy and can also be guided by the user. It provides a generic method for specifying security assumptions on many cryptographic primitives, and can prove secrecy, authentication, and[…]
    • Cryptography

Voir les exposés passés