ABSTRACT The most critical aspect of building a key management system is establishing a secure key storage mechanism. Hardware‐based methods for implementing secure key storage are often costly and lack flexibility. This paper proposes a software‐based approach to create a secure key storage. To achieve this, the encoded round keys are connected to a white‐box key scheduling implementation. Specifically, we demonstrate a technique for generating lookup tables for white‐box cryptography that takes the encoded round keys as input. Using this technique, we show that the confidentiality of the secret key can be maintained from the key storage to the lookup table generation for white‐box cryptography.