Kangmin Kim, Jae-Ho Lee, Jeong-Nyeo Kim, Seungkwang Lee
{"title":"白盒密钥调度与编码的轮密钥安全查找表的生成","authors":"Kangmin Kim, Jae-Ho Lee, Jeong-Nyeo Kim, Seungkwang Lee","doi":"10.1049/ell2.70377","DOIUrl":null,"url":null,"abstract":"<p>The most critical aspect of building a key management system is establishing a secure key storage mechanism. Hardware-based methods for implementing secure key storage are often costly and lack flexibility. This paper proposes a software-based approach to create a secure key storage. To achieve this, the encoded round keys are connected to a white-box key scheduling implementation. Specifically, we demonstrate a technique for generating lookup tables for white-box cryptography that takes the encoded round keys as input. Using this technique, we show that the confidentiality of the secret key can be maintained from the key storage to the lookup table generation for white-box cryptography.</p>","PeriodicalId":11556,"journal":{"name":"Electronics Letters","volume":"61 1","pages":""},"PeriodicalIF":0.8000,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ell2.70377","citationCount":"0","resultStr":"{\"title\":\"White-Box Key Scheduling With Encoded Round Keys for Secure Lookup Table Generation\",\"authors\":\"Kangmin Kim, Jae-Ho Lee, Jeong-Nyeo Kim, Seungkwang Lee\",\"doi\":\"10.1049/ell2.70377\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The most critical aspect of building a key management system is establishing a secure key storage mechanism. Hardware-based methods for implementing secure key storage are often costly and lack flexibility. This paper proposes a software-based approach to create a secure key storage. To achieve this, the encoded round keys are connected to a white-box key scheduling implementation. Specifically, we demonstrate a technique for generating lookup tables for white-box cryptography that takes the encoded round keys as input. Using this technique, we show that the confidentiality of the secret key can be maintained from the key storage to the lookup table generation for white-box cryptography.</p>\",\"PeriodicalId\":11556,\"journal\":{\"name\":\"Electronics Letters\",\"volume\":\"61 1\",\"pages\":\"\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2025-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ell2.70377\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electronics Letters\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ell2.70377\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics Letters","FirstCategoryId":"5","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ell2.70377","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
White-Box Key Scheduling With Encoded Round Keys for Secure Lookup Table Generation
The most critical aspect of building a key management system is establishing a secure key storage mechanism. Hardware-based methods for implementing secure key storage are often costly and lack flexibility. This paper proposes a software-based approach to create a secure key storage. To achieve this, the encoded round keys are connected to a white-box key scheduling implementation. Specifically, we demonstrate a technique for generating lookup tables for white-box cryptography that takes the encoded round keys as input. Using this technique, we show that the confidentiality of the secret key can be maintained from the key storage to the lookup table generation for white-box cryptography.
期刊介绍:
Electronics Letters is an internationally renowned peer-reviewed rapid-communication journal that publishes short original research papers every two weeks. Its broad and interdisciplinary scope covers the latest developments in all electronic engineering related fields including communication, biomedical, optical and device technologies. Electronics Letters also provides further insight into some of the latest developments through special features and interviews.
Scope
As a journal at the forefront of its field, Electronics Letters publishes papers covering all themes of electronic and electrical engineering. The major themes of the journal are listed below.
Antennas and Propagation
Biomedical and Bioinspired Technologies, Signal Processing and Applications
Control Engineering
Electromagnetism: Theory, Materials and Devices
Electronic Circuits and Systems
Image, Video and Vision Processing and Applications
Information, Computing and Communications
Instrumentation and Measurement
Microwave Technology
Optical Communications
Photonics and Opto-Electronics
Power Electronics, Energy and Sustainability
Radar, Sonar and Navigation
Semiconductor Technology
Signal Processing
MIMO