WAS: improved white-box cryptographic algorithm over AS iteration

Abstract The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes, WAS, an impr...

Full description

Bibliographic Details
Main Authors: Yatao Yang, Yuying Zhai, Hui Dong, Yanshuo Zhang
Format: Article
Language:English
Published: SpringerOpen 2023-12-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-023-00192-7
_version_ 1827590504896790528
author Yatao Yang
Yuying Zhai
Hui Dong
Yanshuo Zhang
author_facet Yatao Yang
Yuying Zhai
Hui Dong
Yanshuo Zhang
author_sort Yatao Yang
collection DOAJ
description Abstract The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes, WAS, an improved white-box cryptographic algorithm over AS iteration is proposed. This scheme utilizes the AS iterative structure to construct a lookup table with a five-layer ASASA structure, and the maximum distance separable matrix is used as a linear layer to achieve complete diffusion in a small number of rounds. Attackers can be prevented from recovering the key under black-box model. The length of nonlinear layer S and affine layer A in lookup table is 16 bits, which effectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the white-box model, while WAS possesses weak white-box (32 KB, 112)-space hardness to satisfy anti-code lifting security. WAS has provable security and better storage cost than existing schemes, with the same anti-key extraction security and anti-code lifting security, only 128 KB of memory space is required in WAS, which is only 14% of SPACE-16 algorithm and 33% of Yoroi-16 algorithm.
first_indexed 2024-03-09T01:17:47Z
format Article
id doaj.art-9be5c658850041e2ae6a911679d780ce
institution Directory Open Access Journal
issn 2523-3246
language English
last_indexed 2024-03-09T01:17:47Z
publishDate 2023-12-01
publisher SpringerOpen
record_format Article
series Cybersecurity
spelling doaj.art-9be5c658850041e2ae6a911679d780ce2023-12-10T12:22:49ZengSpringerOpenCybersecurity2523-32462023-12-016111110.1186/s42400-023-00192-7WAS: improved white-box cryptographic algorithm over AS iterationYatao Yang0Yuying Zhai1Hui Dong2Yanshuo Zhang3Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology InstituteSchool of Telecommunication Engineering, Xidian UniversityDepartment of Electronic and Communication Engineering, Beijing Electronic Science and Technology InstituteDepartment of Electronic and Communication Engineering, Beijing Electronic Science and Technology InstituteAbstract The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes, WAS, an improved white-box cryptographic algorithm over AS iteration is proposed. This scheme utilizes the AS iterative structure to construct a lookup table with a five-layer ASASA structure, and the maximum distance separable matrix is used as a linear layer to achieve complete diffusion in a small number of rounds. Attackers can be prevented from recovering the key under black-box model. The length of nonlinear layer S and affine layer A in lookup table is 16 bits, which effectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the white-box model, while WAS possesses weak white-box (32 KB, 112)-space hardness to satisfy anti-code lifting security. WAS has provable security and better storage cost than existing schemes, with the same anti-key extraction security and anti-code lifting security, only 128 KB of memory space is required in WAS, which is only 14% of SPACE-16 algorithm and 33% of Yoroi-16 algorithm.https://doi.org/10.1186/s42400-023-00192-7White-box cryptographyBlock cipherSubstitution permutation network structureAnti-key extractionAnti-code lifting
spellingShingle Yatao Yang
Yuying Zhai
Hui Dong
Yanshuo Zhang
WAS: improved white-box cryptographic algorithm over AS iteration
Cybersecurity
White-box cryptography
Block cipher
Substitution permutation network structure
Anti-key extraction
Anti-code lifting
title WAS: improved white-box cryptographic algorithm over AS iteration
title_full WAS: improved white-box cryptographic algorithm over AS iteration
title_fullStr WAS: improved white-box cryptographic algorithm over AS iteration
title_full_unstemmed WAS: improved white-box cryptographic algorithm over AS iteration
title_short WAS: improved white-box cryptographic algorithm over AS iteration
title_sort was improved white box cryptographic algorithm over as iteration
topic White-box cryptography
Block cipher
Substitution permutation network structure
Anti-key extraction
Anti-code lifting
url https://doi.org/10.1186/s42400-023-00192-7
work_keys_str_mv AT yataoyang wasimprovedwhiteboxcryptographicalgorithmoverasiteration
AT yuyingzhai wasimprovedwhiteboxcryptographicalgorithmoverasiteration
AT huidong wasimprovedwhiteboxcryptographicalgorithmoverasiteration
AT yanshuozhang wasimprovedwhiteboxcryptographicalgorithmoverasiteration