Netinfo Security ›› 2023, Vol. 23 ›› Issue (6): 66-73.doi: 10.3969/j.issn.1671-1122.2023.06.007

Previous Articles     Next Articles

Software Tamper Resistance Scheme Based on White-Box CLEFIA Implementation

LUO Yinuo1, YAO Si1, CHEN Jie1,2(), DONG Xiaoli3   

  1. 1. School of Telecommunications Engineering, Xidian University, Xi’an 710071, China
    2. Henan Key Laboratory of Network Cryptography Technology, Zhengzhou 100190, China
    3. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
  • Received:2023-02-09 Online:2023-06-10 Published:2023-06-20

Abstract:

In 2002, Chow et al. defined the concept of white-box attack context according to the application scenario of digital rights management (DRM), and modeled it as an extreme attack model, namely white-box model. The white-box model subverts many restrictions on the ability of the attacker in the previous attack model. From the point of view of software protection, the attacker is considered to have complete control over the target software and its execution. Therefore, in the white-box model, devices in digital rights management systems, such as smart cards and set-top boxes, may be tampered with by attackers. Based on the white-box implementation scheme of CLEFIA algorithm, this paper proposed a software tamper-resistance scheme for digital rights management system. This scheme hided the lookup table interpreted by the binary code file of the software in the lookup table set of the white-box implementation scheme of the CLEFIA algorithm, so that the tamper-resistance security of the software was combined with the encryption and decryption correctness of the white-box implementation scheme of the CLEFIA algorithm. If the software suffers tampering, an error will occur in the encryption and decryption result of the white-box implementation of CLEFIA algorithm. In addition, it is difficult for the attacker to repair the correctness of the encryption and decryption of the white-box implementation of the CLEFIA algorithm.

Key words: software tamper resistance, white-box attack context, white-box implementation, lookup table, CLEFIA algorithm

CLC Number: