SlideShare a Scribd company logo
Broslavsky Oleg
SiBears
Attacker is assumed to have:
Zero visibility on code during
execution
External information, such as plaintext
or ciphertext
Considered secure as long as the
cipher has no cryptographic
weaknesses
Attacker is assumed to have:
Partial physical access to the
cryptographic key as a result of the
cipher leaking side-channel
information
 Electromagnetic radiation analysis
 Current/power consumption analysis
 Operation timing analysis
Attacker is assumed to have:
Full visibility — inputs, outputs,
memory (using debuggers), and
intermediate calculations
Access to the algorithms while
watching how they are carried out
Traditional cryptography is not secure
when running in a white-box model
Digital Rights Management Systems
 The end-user is then able to purchase some
type of premium content (e.g., new GoT
season)
 The content arrives at the user’s device
encrypted, and is decrypted by the software
as it is viewed
 A malicious end-user may attempt to extract
cryptographic keys from the software and
then use them to redistribute content outside
the DRM system
Client-side web application.
 Web application forms some client-side
queries to the backend
 A malicious user may attempt to form
malicious queries and exploit some backend
vulnerabilities
Common case W/ white-box crypto in JS
Generate for every key a fixed
implementation, that will contain
hard-coded key
Hide hardcoded key so,
that encrypt and decrypt
operations maintain sensitive
data without revealing any
portions of the key
Make the key extraction difficult
or even impracticable
The Advanced Encryption Standard (AES) is a specification for the encryptionof
electronic data established by the U.S. National Institute of Standards and
Technology (NIST)
White box cryptography
Each byte in
the state matrix is replaced
with a SubByte using an 8-
bit substitution box
This operation provides the
non-linearity in the cipher.
The S-box used is derived
from the multiplicative
inverse over GF(28)
Known to have good non-
linearity properties
Cyclically shifts the bytes in each row by a
certain offset
The importance of this step is to avoid the
columns being linearly independent
Together with ShiftRows,
MixColumns provides diffusion in
the cipher
Each column is treated as a
polynomial over GF(28) and is
then multiplied modulo x4+1 with
a fixed polynomial
c(x) = 3x3 + x2 + x + 2
For each round, a round
key is derived from the
main key using Rijndael's
key schedule
The subkey is added by
combining each byte of the
state with the
corresponding byte of the
subkey using bitwise XOR
Move 0 round
key into the loop
Swap SubBytes and
ShiftRows operations
(order of bytes affects
only the order of
substitutions not the
result at all)
Combine
AddShiftedRoudKey and
SubBytes into Nr
substitution tables (one
for each round).
Name such tables T-
tables and will calculate
them as following:
Since the MixColumns is
a linear transformation,
it can also be
implemented using
couple of tables
MixColumns step can be decomposed into an exclusive-or of
four 32-bit values
4 x TyTables each with 256
entries (one for every
possible byte value)
XOR operation also could
easily be implemented
using substitution tables
More information can be found in §4
of A Tutorial on White-box AES by
James Muir
For more security Chow
suggest to apply to the
state in every round
invertible mixing
bijections and external
encodings
Comics styled AES
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Website with aggregated information about white-box
cryptography
http://www.whiteboxcrypto.com/
A Tutorial on White-box AES by James Muir
https://ccsl.carleton.ca/~jamuir/papers/wb-aes-tutorial.pdf
Some example implementations of White-box AES and attacks
on it
https://github.com/openwhitebox
Oleg Broslavsky
ovbroslavsky@gmail.com
@yalegko

More Related Content

PDF
ICv2 White Paper 2021: Hobby Games Market in the Covid Year
PPTX
Confidentiality policies UNIT 2 (CSS)
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PDF
White-box Cryptography -BayThreat 2013
PDF
White-Box HMAC. Make your cipher secure to white-box attacks.
PPTX
ИИ: Этические аспекты проблемы выбора
PDF
SE-4128, DRM: From software secrets to hardware protection, by Rod Schultz
PDF
Hide and seek - interesting uses of forensics and covert channels.
ICv2 White Paper 2021: Hobby Games Market in the Covid Year
Confidentiality policies UNIT 2 (CSS)
ANTIVIRUS AND VIRUS Powerpoint presentation
White-box Cryptography -BayThreat 2013
White-Box HMAC. Make your cipher secure to white-box attacks.
ИИ: Этические аспекты проблемы выбора
SE-4128, DRM: From software secrets to hardware protection, by Rod Schultz
Hide and seek - interesting uses of forensics and covert channels.

Viewers also liked (6)

PDF
How to admin
PDF
How to make school CTF
PPTX
AOP and Inversion of Conrol
PDF
How to Open School For Young Hackers
PDF
Apt(advanced persistent threat) 공격의 현재와 대응 방안
PPTX
Slideshare ppt
How to admin
How to make school CTF
AOP and Inversion of Conrol
How to Open School For Young Hackers
Apt(advanced persistent threat) 공격의 현재와 대응 방안
Slideshare ppt
Ad

Similar to White box cryptography (20)

PDF
Bluetooth Low Energy - A Case Study
PPTX
Information and data security pseudorandom number generation and stream cipher
PPTX
A study of cryptography for satellite applications
PDF
Ci25500508
PDF
Verilog
PDF
Next generation block ciphers
PDF
Network Security UNIT-II
PDF
Gsm Soft Viterbi Code
PDF
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
PDF
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
PDF
A new cryptosystem with four levels of encryption and parallel programming
PPT
Introduction of digital system
PDF
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
PDF
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
Js2517181724
PDF
Js2517181724
PPTX
1 Unit-1 DEC B.Tech ECE III Sem Syllabus & Intro.pptx
PPT
AA Lecture 01 of my lecture os ghhhggh.ppt
Bluetooth Low Energy - A Case Study
Information and data security pseudorandom number generation and stream cipher
A study of cryptography for satellite applications
Ci25500508
Verilog
Next generation block ciphers
Network Security UNIT-II
Gsm Soft Viterbi Code
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A new cryptosystem with four levels of encryption and parallel programming
Introduction of digital system
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Js2517181724
Js2517181724
1 Unit-1 DEC B.Tech ECE III Sem Syllabus & Intro.pptx
AA Lecture 01 of my lecture os ghhhggh.ppt
Ad

More from yalegko (8)

PDF
SD-WAN Internet Census
PDF
So Your WAF Needs a Parser
PDF
WebGoat.SDWAN.Net in Depth
PDF
[ISC] Docker + Swarm
PPTX
Covert timing channels using HTTP cache headers
PPTX
Covert timing channels using HTTP cache headers
PPTX
Include and extend in Ruby
PPTX
Not a children in da web
SD-WAN Internet Census
So Your WAF Needs a Parser
WebGoat.SDWAN.Net in Depth
[ISC] Docker + Swarm
Covert timing channels using HTTP cache headers
Covert timing channels using HTTP cache headers
Include and extend in Ruby
Not a children in da web

Recently uploaded (20)

PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
innovation process that make everything different.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Funds Management Learning Material for Beg
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPT
tcp ip networks nd ip layering assotred slides
PDF
Paper PDF World Game (s) Great Redesign.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Testing WebRTC applications at scale.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Module 1 - Cyber Law and Ethics 101.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Internet___Basics___Styled_ presentation
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
innovation process that make everything different.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Design_with_Watersergyerge45hrbgre4top (1).ppt
Funds Management Learning Material for Beg
introduction about ICD -10 & ICD-11 ppt.pptx
presentation_pfe-universite-molay-seltan.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introuction about WHO-FIC in ICD-10.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
RPKI Status Update, presented by Makito Lay at IDNOG 10
Slides PDF The World Game (s) Eco Economic Epochs.pdf
tcp ip networks nd ip layering assotred slides
Paper PDF World Game (s) Great Redesign.pdf

White box cryptography

  • 2. Attacker is assumed to have: Zero visibility on code during execution External information, such as plaintext or ciphertext Considered secure as long as the cipher has no cryptographic weaknesses
  • 3. Attacker is assumed to have: Partial physical access to the cryptographic key as a result of the cipher leaking side-channel information  Electromagnetic radiation analysis  Current/power consumption analysis  Operation timing analysis
  • 4. Attacker is assumed to have: Full visibility — inputs, outputs, memory (using debuggers), and intermediate calculations Access to the algorithms while watching how they are carried out Traditional cryptography is not secure when running in a white-box model
  • 5. Digital Rights Management Systems  The end-user is then able to purchase some type of premium content (e.g., new GoT season)  The content arrives at the user’s device encrypted, and is decrypted by the software as it is viewed  A malicious end-user may attempt to extract cryptographic keys from the software and then use them to redistribute content outside the DRM system
  • 6. Client-side web application.  Web application forms some client-side queries to the backend  A malicious user may attempt to form malicious queries and exploit some backend vulnerabilities Common case W/ white-box crypto in JS
  • 7. Generate for every key a fixed implementation, that will contain hard-coded key Hide hardcoded key so, that encrypt and decrypt operations maintain sensitive data without revealing any portions of the key Make the key extraction difficult or even impracticable
  • 8. The Advanced Encryption Standard (AES) is a specification for the encryptionof electronic data established by the U.S. National Institute of Standards and Technology (NIST)
  • 10. Each byte in the state matrix is replaced with a SubByte using an 8- bit substitution box This operation provides the non-linearity in the cipher. The S-box used is derived from the multiplicative inverse over GF(28) Known to have good non- linearity properties
  • 11. Cyclically shifts the bytes in each row by a certain offset The importance of this step is to avoid the columns being linearly independent
  • 12. Together with ShiftRows, MixColumns provides diffusion in the cipher Each column is treated as a polynomial over GF(28) and is then multiplied modulo x4+1 with a fixed polynomial c(x) = 3x3 + x2 + x + 2
  • 13. For each round, a round key is derived from the main key using Rijndael's key schedule The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise XOR
  • 14. Move 0 round key into the loop Swap SubBytes and ShiftRows operations (order of bytes affects only the order of substitutions not the result at all)
  • 15. Combine AddShiftedRoudKey and SubBytes into Nr substitution tables (one for each round). Name such tables T- tables and will calculate them as following:
  • 16. Since the MixColumns is a linear transformation, it can also be implemented using couple of tables
  • 17. MixColumns step can be decomposed into an exclusive-or of four 32-bit values 4 x TyTables each with 256 entries (one for every possible byte value) XOR operation also could easily be implemented using substitution tables
  • 18. More information can be found in §4 of A Tutorial on White-box AES by James Muir For more security Chow suggest to apply to the state in every round invertible mixing bijections and external encodings
  • 19. Comics styled AES http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html Website with aggregated information about white-box cryptography http://www.whiteboxcrypto.com/ A Tutorial on White-box AES by James Muir https://ccsl.carleton.ca/~jamuir/papers/wb-aes-tutorial.pdf Some example implementations of White-box AES and attacks on it https://github.com/openwhitebox