Sciweavers

Share
DRM
2007
Springer

Mechanism for software tamper resistance: an application of white-box cryptography

10 years 5 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over its execution. The goal of white-box cryptography is to implement cryptographic algorithms in software such that it is hard for an attacker to extract the key by a white-box attack. Chow et al.[8, 7] present white-box implementations for AES and DES. Based on their ideas, white-box implementations can be derived for other block ciphers as well. In the white-box implementations the key of the underlying block cipher is expanded from several bytes to a collection of lookup tables with a total size in the order of hundreds of kilobytes. In this paper we present a technique that uses a white-box implementation to make software tamper resistant. The technique interprets the binary of software code as lookup tables, which are next incorporated into the collection of lookup tables of a white-box implementation. This m...
Wil Michiels, Paul Gorissen
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where DRM
Authors Wil Michiels, Paul Gorissen
Comments (0)
books