Browse > Article
http://dx.doi.org/10.6109/jkiice.2022.26.9.1382

Lightweight AES-based Whitebox Cryptography for Secure Internet of Things  

Lee, Jin-Min (Department of Future Convergence Technology Engineering, Sungshin Women's University)
Kim, So-Yeon (Department of Future Convergence Technology Engineering, Sungshin Women's University)
Lee, Il-Gu (Department of Future Convergence Technology Engineering, Sungshin Women's University)
Abstract
White-box cryptography can respond to white-box attacks that can access and modify memory by safely hiding keys in the lookup table. However, because the size of lookup tables is large and the speed of encryption is slow, it is difficult to apply them to devices that require real-time while having limited resources, such as IoT(Internet of Things) devices. In this work, we propose a scheme for collecting short-length plaintexts and processing them at once, utilizing the characteristics that white-box ciphers process encryption on a lookup table size basis. As a result of comparing the proposed method, assuming that the table sizes of the Chow and XiaoLai schemes were 720KB(Kilobytes) and 18,000KB, respectively, memory usage reduced by about 29.9% and 1.24% on average in the Chow and XiaoLai schemes. The latency was decreased by about 3.36% and about 2.6% on average in the Chow and XiaoLai schemes, respectively, at a Traffic Load Rate of 15 Mbps(Mega bit per second) or higher.
Keywords
Whitebox cryptography; Memory optimization; Reduced latency; Lightweight device;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. K. Lee and Y. S. Kang, "Principles and Statistical Analysis of White Box Ciphers," IITP Weekly ICT Trends, vol. 1977, pp. 15-25, Dec. 2020.
2 Y. Xiao and X. Lai, "A Secure Implementation of White-Box AES," in Proceedings of 2009 2nd International Conference on Computer Science and its Applications, Jeju, Korea, pp. 1-6, 2009.
3 S. Lee, T. Kim, and Y. Kang, "A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis," IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2602-2615, Oct. 2018.   DOI
4 S. -V. Ghita, V. -V. Patriciu, and I. Bica, "A new DRM architecture based on mobilel code and white-box encryption," in Proceedings of 2012 9th International Conference on Communications, Bucharest, Romania, pp. 303-306, 2012.
5 Y. C. Lee, S. H. Jin, H. V. Kim, H. S. Kim, and S. H. Hong, "New Higher-Order Differential Computation Analysis on Masked White-Box AES," Journal of The Korea Institute of Information Security and Cryptology, vol. 30, no. 1, pp. 1-15, Feb. 2020.   DOI
6 D. G. V. Albricci, M. Ceria, F. Cioschi, N. Fornari, A. Shakiba, and A. Visconti, "Measuring Performances of a White-Box Approach in the IoT Context," Symmetry, vol. 11, no. 8, pp. 1-19, Aug. 2019.
7 Y. Shi, W. Wei, H. Fan, M. H. Au, and X. Luo, "A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices," IEEE Transactions on Computers, vol. 68, no. 10, pp. 1411-1427, Oct. 2011.
8 doegox. Deadpool [Internet]. Available: https://github.com/SideChannelMarvels/Deadpool.
9 S. M. Cho, and S. H. Seo, "Current status of cryptographic technology applied to drone security," Review of Korea Institute of Information Security and Cryptology, vol.30, no. 2, pp.11-19. Apr. 2020.
10 S. Chow, P. Eisen, H. Johnson, and P. C. V. Oorschot, "White-Box Cryptography and an AES Implementation," in Proceedings of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, pp. 250-270, 2003.
11 S. H. Kim, Y. K Lee, and B. H. Chung, "Analysis on Trends for White-Box Cryptography and Its Application Technology," Electronics and Telecommunications Trends, vol. 25, no. 5, pp. 137-146, Oct. 2010.   DOI
12 K. Kapusta, G. Memmi, and H. Noura, "Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks," Annals of Telecommunications, vol. 74, no. 3-4, pp. 157-165, Apr. 2019.   DOI
13 L. Zhou, C. Su, Y. Wen, W. Li, and Z. Gong, "Towards practical white-box lightweight block cipher implementations for IoTs," Future Generation Computer Systems, vol. 86, no. 507-514, Sep. 2018.
14 A. Saha and C. Srinivasan, "White-Box cryptography based data encryption-decryption scheme for IoT environment," in Proceedings of 2019 5th International Conference on Advanced Computing &Communication Systems, Coimbatore, India, pp. 637-641, 2019.
15 D. H. Choi and C. K. Hong, "A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment," Journal of Convergence for Information Technology, vol. 9, no. 10, pp. 9-15, Oct. 2019.   DOI