作者
Stanley Chow, Philip Eisen, Harold Johnson, Paul van Oorschot
发表日期
2003
期刊
Selected Areas in Cryptography (SAC 2003)
页码范围
250-270
出版商
Springer Berlin/Heidelberg
简介
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments. As an example, we show how aes can be implemented as a series of lookups in key-dependent tables. The intent is to hide the key by a combination of encoding its tables with random bijections representing compositions rather than individual steps, and extending the cryptographic boundary by pushing it out further into the containing application. We partially justify our aes implementation, and motivate its design, by showing how removal of parts of the …
引用总数
2002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202434161612141216191618273034574145655245494714
学术搜索中的文章
S Chow, P Eisen, H Johnson, PC Van Oorschot - Selected Areas in Cryptography: 9th Annual …, 2003
S Chow, P Eisen, H Johnson, PC Van Oorschot… - Selected Areas in Cryptography, Springer, 2003