"White-box cryptography is a technique to hide a secret key into a cryptographic software implementation in a white-box model. In such a model, an adversary has full control over the execution environment.
A white-box DES encryption binary with embedded secret key. If you like, try to extract the secret key, using all information you can find from this implementation (input-ouput attacks, so called black box attacks, are not allowed). "
here is there demo link (cygwin1.dll is needed):
https://www.cosic.esat.kuleuven.be/sopro/wbc/wbDES.exe
here is there website:
https://www.cosic.esat.kuleuven.be/sopro/
https://www.cosic.esat.kuleuven.be/sopro/wbc/
i'm currently working on this and look at the attached file that i have made :P
come and join to reverse this protection ... sooner the better
regards,
LaBBa.
Welcome to the new Woodmann RCE Messageboards Regroupment
Please be patient while the rest of the site is restored.
To all Members of the old RCE Forums:
In order to log in, it will be necessary to reset your forum login password ("I forgot my password") using the original email address you registered with. You will be sent an email with a link to reset your password for that member account.
The old vBulletin forum was converted to phpBB format, requiring the passwords to be reset. If this is a problem for some because of a forgotten email address, please feel free to re-register with a new username. We are happy to welcome old and new members back to the forums! Thanks.
All new accounts are manually activated before you can post. Any questions can be PM'ed to Kayaker.
Please be patient while the rest of the site is restored.
To all Members of the old RCE Forums:
In order to log in, it will be necessary to reset your forum login password ("I forgot my password") using the original email address you registered with. You will be sent an email with a link to reset your password for that member account.
The old vBulletin forum was converted to phpBB format, requiring the passwords to be reset. If this is a problem for some because of a forgotten email address, please feel free to re-register with a new username. We are happy to welcome old and new members back to the forums! Thanks.
All new accounts are manually activated before you can post. Any questions can be PM'ed to Kayaker.
White-Box Cryptography
White-Box Cryptography
- Attachments
-
- sub_401050.zip
- (3.34 KiB) Downloaded 436 times
White-Box DES Cryptanalysis
The implementations you refer to, are implemented according to the description of white-box DES implementations by Chow et al. [http://crypto.stanford.edu/DRM2002/whitebox.pdf], with some minor improvements [`clarifying obfuscation'-paper, by Link et al.; and some personal improvements].
I implemented this binary, to test my cryptanalysis results mid 2006. The details of the cryptanalysis are published at SAC'07, and is mentioned on the website you refer to. See also http://eprint.iacr.org/2007/104 for technical details. A different cryptanalysis result has been published at SA'07 too (See http://eprint.iacr.org/2007/035).
More information on white-box cryptography will appear on a to-be-launched website: http://www.whiteboxcrypto.com. This will include a PhD thesis on this topic, which I'm writing at this very moment.
You mention that input-output (black-box) attacks are not allowed. I disagree. Every cryptographic implementation should at least be able to withstand black-box attacks. Given full control over the implementation and its execution environment, an adversary could just execute the implementation as black-box as many times as he wishes to. Why would an adversary bother to deploy an more sophisticated white-box attack when simple is possible?
Protection against implementation attacks (side-channel and white-box) is an extra level of defense, on top of black-box protection. Hence, it only makes sense to implement "secure" ciphers (DES, AES, ...).
Best regards,
Brecht Wyseur
I implemented this binary, to test my cryptanalysis results mid 2006. The details of the cryptanalysis are published at SAC'07, and is mentioned on the website you refer to. See also http://eprint.iacr.org/2007/104 for technical details. A different cryptanalysis result has been published at SA'07 too (See http://eprint.iacr.org/2007/035).
More information on white-box cryptography will appear on a to-be-launched website: http://www.whiteboxcrypto.com. This will include a PhD thesis on this topic, which I'm writing at this very moment.
You mention that input-output (black-box) attacks are not allowed. I disagree. Every cryptographic implementation should at least be able to withstand black-box attacks. Given full control over the implementation and its execution environment, an adversary could just execute the implementation as black-box as many times as he wishes to. Why would an adversary bother to deploy an more sophisticated white-box attack when simple is possible?
Protection against implementation attacks (side-channel and white-box) is an extra level of defense, on top of black-box protection. Hence, it only makes sense to implement "secure" ciphers (DES, AES, ...).
Best regards,
Brecht Wyseur
Another White Box scheme
The scheme presented at link below is not a Rijndael. But this scheme has a similar principle. I'll publish a white box tables generator a little bit later if it is interesting for somebody.
http://rapidshare.de/files/46842216/wb_sample.rar.html
http://rapidshare.de/files/46842216/wb_sample.rar.html
Thank you!! the code looks VERY interesting, I will have to study it in detail (work permitting), many thanks.
This looks like to be a very interesting technique, I'm happy to learn it with a 'live' example, thanks again
This looks like to be a very interesting technique, I'm happy to learn it with a 'live' example, thanks again

I want to know God's thoughts ...the rest are details.
(A. Einstein)
--------
..."a shellcode is a command you do at the linux shell"...
(A. Einstein)
--------
..."a shellcode is a command you do at the linux shell"...
rendari wrote:Anyone still have the white box files dmitry posted? Or are they lost for all of time![]()
A paper which describes my approach is presented here: http://eprint.iacr.org/2010/419.pdf.
Source code and sample are presented here: http://www.guardant.ru/download/personal/white_box.zip.