Yang Shi (Tongji University), Tianchen Gao (Tongji University), Yimin Li (Tongji University), Jiayao Gao (Tongji University), Kaifeng Huang (Tongji University)

Encryption algorithms face various key-extraction attacks, prompting a variety of defensive works under different threat models. Among these, the white-box threat model has the strongest adversarial scenario, where attackers have full access to and control over the cryptographic implementation and its execution environment. However, prior white-box encryption designs primarily protected a single key-dependent table, enabling white-box and side-channel attacks to recover the key. Based on our observation, fuzzing the boundaries of these tables can make attacks ineffective. Thus, we proposed WBSLT, a novel design framework for tabulated white-box implementations of substitution-linear transformation (SLT) ciphers. WBSLT protects key-embedded tables with linear and nonlinear transformations and partially leaves each component’s computation to the next component to mitigate single key-dependent table breach. To further defend against differential computation analysis and differential fault analysis, the framework integrates masking, shuffling and external encoding. Theoretical analysis indicates its immunity to various attacks. Experimental results validate the practicality of WBSLT across multiple computing platforms, showing efficient encryption performance and reasonable memory consumption.

View More Papers

Q-MLLM: Vector Quantization for Robust Multimodal Large Language Model...

Wei Zhao (Singapore Management University), Zhe Li (Singapore Management University), Yige Li (Singapore Management University), Jun Sun (Singapore Management University)

Read More

Cognitive Threat Detection for SOC Operations: Automating Manipulation Tactic...

Keerthana Madhavan (School of Computer Science, University of Guelph, Canada), Luiza Antonie (School of Computer Science; CARE-AI, University of Guelph, Canada), Stacey D. Scott, School of Computer Science; CARE-AI, University of Guelph, Canada)

Read More

Efficiently Detecting DBMS Bugs through Bottom-up Syntax-based SQL Generation

Yu Liang (The Pennsylvania State University), Peng Liu (The Pennsylvania State University)

Read More