Study on white-box cryptography: Key whitening and entropy attacks

White-box cryptography is intended on saving software completions of algorithms based on cryptography against the recovery of key. They are mainly applied in applications based on Digital Rights Managements (DRM) as a cost effective substitute. This paper explains White-Box Cryptograph trends and some important problems, also focuses on two most popular cryptographic techniques-key whitening and entropy technique as well as the attacks imposed on them.

[1]  Himanshu Gupta,et al.  ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .

[2]  Yu-Lun Huang,et al.  A control flow obfuscation method to discourage malicious tampering of software codes , 2006, ASIACCS '06.

[3]  S. Som,et al.  Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[4]  Vinod Kumar Sharma,et al.  Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .

[5]  Muhammad Shahid,et al.  A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment , 2015 .

[6]  Andrey Bogdanov,et al.  White-Box Cryptography Revisited: Space-Hard Ciphers , 2015, CCS.

[7]  J. K. Mandal,et al.  Key based bit level genetic cryptographic technique (KBGCT) , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[8]  Bart Preneel,et al.  Cryptanalysis of a Perturbated White-Box AES Implementation , 2010, INDOCRYPT.

[9]  Xuejia Lai,et al.  A Secure Implementation of White-Box AES , 2009, 2009 2nd International Conference on Computer Science and its Applications.

[10]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[11]  Wil Michiels Opportunities in White-Box Cryptography , 2010, IEEE Security & Privacy.

[12]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Wanlei Zhou,et al.  Detection and defense of application-layer DDoS attacks in backbone web traffic , 2014, Future Gener. Comput. Syst..

[14]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[15]  Bart Preneel,et al.  Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings , 2007, IACR Cryptol. ePrint Arch..

[16]  Subhranil Som,et al.  Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function , 2013 .

[17]  Xuemin Shen,et al.  A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding , 2009, Comput. Networks.

[18]  Ajay Vikram Singh,et al.  Mitigation of DoS attacks by using multiple encryptions in MANETs , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[19]  HongTae Kim,et al.  On Conditions to Satisfy White-Box Cryptography , 2014 .

[20]  Thomas S. Messerges,et al.  Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.

[21]  Bart Preneel,et al.  Towards Security Notions for White-Box Cryptography , 2009, ISC.

[22]  N. Venkatesu,et al.  An Effective Defense Against Distributed Denial of Service in GRID , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[23]  Sarvesh Tanwar,et al.  Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation , 2013 .

[24]  Wanlei Zhou,et al.  Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[25]  Abhinav Bhandari,et al.  Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks , 2015 .

[26]  Shivi Goel Cryptography and its Prominent Branches , 2013 .

[27]  Brecht Wyseur,et al.  White-Box Cryptography , 2011, Encyclopedia of Cryptography and Security.

[28]  N. Venkatesu,et al.  Notice of Violation of IEEE Publication PrinciplesAn Effective Defense against Distributed Denial of Service in Grid , 2008, 2010 First International Conference on Integrated Intelligent Computing.

[29]  Alex Biryukov,et al.  Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) , 2014, ASIACRYPT.

[30]  Amitabh Saxena,et al.  On White-box Cryptography and Obfuscation , 2008, ArXiv.

[31]  Bart Preneel,et al.  Two Attacks on a White-Box AES Implementation , 2013, Selected Areas in Cryptography.

[32]  홍원기,et al.  A Flow-based Method for Abnormal Network Traffic Detection , 2004 .

[33]  Li Yang White Box Cryptography , 2022 .

[34]  James A. Muir,et al.  A Tutorial on White-box AES , 2013, IACR Cryptol. ePrint Arch..

[35]  R.C. Joshi,et al.  A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain , 2007, 2007 International Conference on Signal Processing, Communications and Networking.