Hybrid WBC: Secure and efficient white-box encryption schemes

Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


White-box cryptography aims at providing security against an adversary that has access to the encryption process. Numerous whitebox encryption schemes were proposed since the introduction of whitebox cryptography by Chow et al. in 2002. However, most of them are slow, and thus, can be used in practice only to protect very small amounts of information, such as encryption keys. In this extended abstract we present a new threat model for whitebox cryptography which corresponds to the practical abilities of the adversary in a wide range of applications. Furthermore, we study design criteria for white-box primitives that are important from the industry point of view. Finally, we propose a class of new primitives that combine a white-box algorithm with a standard block cipher to obtain white-box protection for encrypting long messages, with high security and reasonable performance.

Original languageAmerican English
Title of host publicationCryptology and Network Security - 15th International Conference, CANS 2016, Proceedings
EditorsGiuseppe Persiano, Sara Foresti
PublisherSpringer Verlag
Number of pages6
ISBN (Print)9783319489643
StatePublished - 2016
Event15th International Conference on Cryptology and Network Security, CANS 2016 - Milan, Italy
Duration: 14 Nov 201616 Nov 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10052 LNCS


Conference15th International Conference on Cryptology and Network Security, CANS 2016

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Hybrid WBC: Secure and efficient white-box encryption schemes'. Together they form a unique fingerprint.

Cite this