At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target. In this work, we describe practical attacks on the construction. For the implementation without one of the external encodings, we describe a simple algebraic key recovery attack. If both external encodings are used (the main scenario suggested by the authors), we propose optimization and inversion attacks, followed by our main result - a multiple-step round decomposition attack and a decomposition-based key recovery attack. Our attacks only use the white-box round functions as oracles and do not ...
International audienceWhite-box cryptography aims to protect the secret key of a cipher in an enviro...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...
Abstract. White-box cryptography is an obfuscation technique to protect the secret key in the softwa...
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a n...
Abstract. In response to various cryptanalysis results on white-box cryptography, Bringer et al. pre...
Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure ...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a ...
peer reviewedThe goal of white-box cryptography is to protect secret keys embedded in a cryptographi...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
White-box cryptography aims to ensure the security of cryptographic algorithms in an untrusted envir...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
International audienceWhite-box cryptography aims to protect the secret key of a cipher in an enviro...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...
Abstract. White-box cryptography is an obfuscation technique to protect the secret key in the softwa...
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a n...
Abstract. In response to various cryptanalysis results on white-box cryptography, Bringer et al. pre...
Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure ...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a ...
peer reviewedThe goal of white-box cryptography is to protect secret keys embedded in a cryptographi...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
White-box cryptography aims to ensure the security of cryptographic algorithms in an untrusted envir...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
International audienceWhite-box cryptography aims to protect the secret key of a cipher in an enviro...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...