White-Box Cryptography: Introduction

31 Jan 2016

White-Box Cryptography is the study of securing symmetric encryption algorithms in the white-box attack context (WBAC), where an adversary obtains an implementation of the algorithm and is allowed to observe/alter every step of its execution (with instantiated cryptographic keys).

It is a subfield of the more general Mobile Cryptography (coined in the late 90s), which today is more likely to be called Secure Outsourcing.

Secure outsourcing handles all cases where you want an adversary to run code for you. There are a lot of natural goals that a cryptographer might like to achieve in this setting. A few examples,

I want to focus on obfuscation. Encrypting a plaintext and obfuscating a program are superficially similar. When encryption was first being explored, it took time to develop a good understanding of what it means for encryption to be secure. Similarly, researchers are now working on constructive definitions of program obfuscation.

Virtual Black Boxes

An early candidate definition was virtual black box obfuscation (VBBO), which states that anything which can be learned from the obfuscated program can also be learned with a polynomial number of queries to an oracle computing the program.

Digging into this definition, two families of circuits seem important:

Learnable circuits are nice because they can all be virtual black box obfuscated. Define the obfuscation of a learnable circuit as what an efficient learner would output after interacting with an oracle computing .

However, normed circuits cause a problem, because there are normed circuits which are not learnable and this makes them inherently unobfuscatable under this definition.

Take, for example, Ordered Binary Decision Diagrams (OBDDs). That is, functions that reference their inputs only once, in a fixed order, and output 0 or 1. The number of oracle queries it takes to learn an OBDD is obviously exponential in the number of inputs. But if we try to obfuscate an OBDD as another OBDD, this doesn’t work because there are efficient algorithms to convert it back to a canonical form. The canonical form would let an adversary distinguish two circuits which are the same everywhere except at a single input from two circuits which are truly the same at every point (which strictly access to an oracle wouldn’t allow).

Stronger versions of this idea are true for other families of circuits, and this is why VBBO is believed to be fundamentally flawed. Indeed, maybe VBBO is too strong and should be weakened, because learning nothing from an obfuscation is a very high bar.

Drawing a parallel to early PRP games: Say that we have a program , and we give an obfuscation to an adversary, which computes on all inputs not in . Does it matter if our adversary can use the obfuscation to distinguish from random on inputs in , if he can’t compute them? (Meaning that possessing an obfuscation is more powerful than interacting with an oracle.) It depends on context.

Obfuscating Ciphers

When obfuscating a cipher, the goal is to hide the key that the cipher was instantiated with. This is usually a precursor to any of the other goals in the intro.

For any cipher , there’s a family of circuits which compute encryption for any given key . By the definition of a secure cipher, these circuits are not learnable, so we have no trivial way to obfuscate them.

At a high level, obfuscation must consist of mapping each to a family which:

  1. Is exponentially large in a security parameter.
  2. Consists of circuits of polynomial size.
  3. Consists of circuits which are functionally similar to (similar, meaning that the actual value of is easy to recover if it is not given exactly).
  4. Lacks an efficient way to find from .

An obfuscation of is then just a random element from . You can see this idea in action in the construction of many multivariate public-key encryption schemes, but particularly with the Hidden Field Equations cryptosystem. They take a polynomial which is easy-to-invert, and generate random invertible affine transformations . The hard-to-invert system is the public key, and the tuple is the private key. is reasonably sized and ‘similar’ to , even though there are an exponential number of choices for and . And ideally, it is difficult to recover from this system.

WBC often ends up being very close to multivariate cryptography for this reason, but it is distinguished in that WBC covers the attempted obfuscation of given ciphers like AES and DES as well as the construction of new ciphers that are easily obfuscated.

Home ]