경량 블록 암호 PIPO의 음함수 표현과 화이트박스 구현

Vol. 35, No. 3, pp. 477-491, 6월. 2025
10.13089/JKIISC.2025.35.3.477, Full Text:
Keywords: White-box implementation, implicit white-box implementation, WBC, Block cipher PIPO
Abstract

In 2002, Chow et al. introduced the white-box model, where an attacker can observe and manipulate not only the inputs and outputs of a cryptographic algorithm but also its intermediate values. White-Box Cryptography (WBC) aims to securely protect cryptographic keys within this model using software alone, without relying on secure hardware or on the secrecy of the design. However, the initial look-up table white-box implementations proposed by Chow et al. were proven insecure. In 2022, Ranea et al. proposed a implicit white-box implementation, a new design of white-box implementation based on implicit functions, which represents round functions as implicit functions and computes outputs by solving these equations. This study applies the implicit white-box implementation to the lightweight block cipher PIPO, designed for mobile environments, and introduces algorithms for a white-box module generator and white-box encryption module operations. Furthermore, it compares the memory usage of look-up table and implicit PIPO white-box implementations and analyzes the performance of the implicit PIPO white-box implementation.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
고정빈, 염용진, 이영도, 윤기순, "An Implicit Form of Lightweight Block Cipher PIPO and its White-Box Implementation," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 3, pp. 477-491, 2025. DOI: 10.13089/JKIISC.2025.35.3.477.

[ACM Style]
고정빈, 염용진, 이영도, and 윤기순. 2025. An Implicit Form of Lightweight Block Cipher PIPO and its White-Box Implementation. Journal of The Korea Institute of Information Security and Cryptology, 35, 3, (2025), 477-491. DOI: 10.13089/JKIISC.2025.35.3.477.