Yang Shi (Tongji University), Tianchen Gao (Tongji University), Yimin Li (Tongji University), Jiayao Gao (Tongji University), Kaifeng Huang (Tongji University)

Encryption algorithms face various key-extraction attacks, prompting a variety of defensive works under different threat models. Among these, the white-box threat model has the strongest adversarial scenario, where attackers have full access to and control over the cryptographic implementation and its execution environment. However, prior white-box encryption designs primarily protected a single key-dependent table, enabling white-box and side-channel attacks to recover the key. Based on our observation, fuzzing the boundaries of these tables can make attacks ineffective. Thus, we proposed WBSLT, a novel design framework for tabulated white-box implementations of substitution-linear transformation (SLT) ciphers. WBSLT protects key-embedded tables with linear and nonlinear transformations and partially leaves each component’s computation to the next component to mitigate single key-dependent table breach. To further defend against differential computation analysis and differential fault analysis, the framework integrates masking, shuffling and external encoding. Theoretical analysis indicates its immunity to various attacks. Experimental results validate the practicality of WBSLT across multiple computing platforms, showing efficient encryption performance and reasonable memory consumption.

View More Papers

Should I Trust You? Rethinking the Principle of Zone-Based...

Yuxiao Wu (Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University), Yunyi Zhang (Tsinghua University), Chaoyi Lu (Zhongguancun Laboratory), Baojun Liu (Tsinghua University and Zhongguancun Laboratory)

Read More

CHAMELEOSCAN: Demystifying and Detecting iOS Chameleon Apps via LLM-Powered...

Hongyu Lin (Zhejiang University), Yicheng Hu (Zhejiang University), Haitao Xu (Zhejiang University), Yanchen Lu (Zhejiang University), Mengxia Ren (Zhejiang University), Shuai Hao (Old Dominion University), Chuan Yue (Colorado School of Mines), Zhao Li (Hangzhou Yugu Technology), Fan Zhang (Zhejiang University), Yixin Jiang (Electric Power Research Institute, CSG)

Read More

Time will Tell: Large-scale De-anonymization of Hidden I2P Services...

Hongze Wang (Southeast University), Zhen Ling (Southeast University), Xiangyu Xu (Southeast University), Yumingzhi Pan (Southeast University), Guangchi Liu (Southeast University), Junzhou Luo (Southeast University and Fuyao University of Science and Technology), Xinwen Fu (University of Massachusetts Lowell)

Read More