Yoni De Mulder
Katholieke Universiteit Leuven
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yoni De Mulder.
workshop on privacy in the electronic society | 2008
Yoni De Mulder; George Danezis; Lejla Batina; Bart Preneel
As devices move within a cellular network, they register their new location with cell base stations to allow for the correct forwarding of data. We show it is possible to identify a mobile user from these records and a pre-existing location profile, based on previous movement. Two different identification processes are studied, and their performances are evaluated on real cell location traces. The best of those allows for the identification of around 80% of users. We also study the misidentified users and characterise them using hierarchical clustering techniques. Our findings highlight the difficulty of anonymizing location data, and firmly establish they are personally identifiable.
international conference on selected areas in cryptography | 2012
Yoni De Mulder; Peter Roelse; Bart Preneel
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232.
international conference on cryptology in india | 2010
Yoni De Mulder; Brecht Wyseur; Bart Preneel
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a novel white-box strategy. They propose to extend the round computations of a block cipher with a set of random equations and perturbations, and complicate the analysis by implementing each such round as one system that is obfuscated with annihilating linear input and output encodings. The improved version presented by Bringer et al. implements the AEw/oS, which is an AES version with key-dependent S-boxes (the S-boxes are in fact the secret key). In this paper we present an algebraic analysis to recover equivalent keys from the implementation. We show how the perturbations and system of random equations can be distinguished from the implementation, and how the linear input and output encodings can be eliminated. The result is that we have decomposed the white-box implementation into a much more simple, functionally equivalent implementation and retrieved a set of keys that are equivalent to the original key. Our cryptanalysis has a worst time complexity of 217 and a negligible space complexity.
selected areas in cryptography | 2013
Tancrède Lepoint; Matthieu Rivain; Yoni De Mulder; Peter Roelse; Bart Preneel
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack referred to as the BGE attack on this implementation, extracts extracting its embedded AES key with a work factor of
conference on current trends in theory and practice of informatics | 2011
Yoni De Mulder; Karel Wouters; Bart Preneel
IACR Cryptology ePrint Archive | 2013
Yoni De Mulder; Peter Roelse; Bart Preneel
2^{30}
Archive | 2012
Peter Roelse; Yoni De Mulder
Lecture Notes in Computer Science | 2012
Yoni De Mulder; Peter Roelse; Bart Preneel
. In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to
Lecture Notes in Computer Science | 2011
Yoni De Mulder; Karel Wouters; Bart Preneel
Lecture Notes in Computer Science | 2010
Yoni De Mulder; Brecht Wyseur; Bart Preneel
2^{22}