Shi, Yang; Fan, Hongfei On security of a white-box implementation of SHARK. (English) Zbl 1397.94098 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 455-471 (2015). Summary: In a white-box attack context, an attacker has full visibility of the implementation of a cipher and full control over its execution environment. As a countermeasure against the threat of a key exposure in this context, a white-box implementation of the block cipher SHARK, i.e., the white-box SHARK, was proposed in a piece of prior work in 2013. However, based on our observation and investigation, it has been derived that the white-box SHARK is insufficiently secure, where the hidden key and external encodings can be extracted with a work factor of approximately \(1.5\;^*\;(2\;^\wedge \;47)\).For the entire collection see [Zbl 1346.68013]. MSC: 94A60 Cryptography Keywords:white-box attack contexts; symmetric encryption; key exposure; SHARK; cryptanalysis Software:SHARK PDFBibTeX XMLCite \textit{Y. Shi} and \textit{H. Fan}, Lect. Notes Comput. Sci. 9290, 455--471 (2015; Zbl 1397.94098) Full Text: DOI