### A Tutorial on White-box AES

James A. Muir

##### Abstract

White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a \emph{white-box attack context}. This is an attack model where all details of the implementation are completely visible to an attacker: not only do they see input and output, they see every intermediate computation that happens along the way. The goal of a white-box attacker when targeting an implementation of a cipher is typically to extract the cryptographic key; thus, white-box implementations have been designed to thwart this goal (\ie to make key extraction difficult/infeasible). The academic study of white-box cryptography was initiated in 2002 in the seminal work of Chow, Eisen, Johnson and van Oorschot (SAC 2002). Here, we review the first white-box AES implementation proposed by Chow \etal and give detailed information on how to construct it. We provide a number of diagrams that summarize the flow of data through the various look-up tables in the implementation, which helps clarify the overall design. We then briefly review the impressive 2004 cryptanalysis by Billet, Gilbert and Ech-Chatbi (SAC 2004). The BGE attack can be used to extract an AES key from Chow \etal's original white-box AES implementation with a work factor of about $2^{30}$, and this fact has motivated subsequent work on improved AES implementations.

Note: This is an extended and corrected version of a paper that was prepared for the proceedings of the 2010 MITACS Workshop on Network Security and Cryptography. The workshop proceedings were published in "Advances in Network Analysis and its Applications", Mathematics in Industry 18 (2013), 209-229.

Available format(s)
Category
Implementation
Publication info
Published elsewhere. workshop version published in "Advances in Network Analysis and its Applications", Mathematics in Industry 18 (2013), 209-229
Keywords
softwareAESwhite-box
Contact author(s)
muir james a @ gmail com
History
2013-02-28: revised
See all versions
Short URL
https://ia.cr/2013/104

CC BY

BibTeX

@misc{cryptoeprint:2013/104,
author = {James A.  Muir},
title = {A Tutorial on White-box AES},
howpublished = {Cryptology ePrint Archive, Paper 2013/104},
year = {2013},
note = {\url{https://eprint.iacr.org/2013/104}},
url = {https://eprint.iacr.org/2013/104}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.