System and method for generating white-box implementations of software applications

A software application, application technology, applied in the field of cryptography, which can solve the problem of subtle errors being easily missed, etc.

Inactive Publication Date: 2011-05-04
IRDETO ACCESS
View PDF16 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The latter is more dangerous: gross bugs are usually caught during testing; while subtle bugs can be easily missed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for generating white-box implementations of software applications
  • System and method for generating white-box implementations of software applications
  • System and method for generating white-box implementations of software applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Clearly, there is a need for a method and system by which the steps of constructing surrounding implicit and mutually implicit parts of an application that uses white-box cryptography functions can be automated, making the error-prone methods currently used to construct such systems methods can be replaced by fairly reliable automated methods. To achieve this, embodiments are disclosed in which the ordinary intra-cryptic parts of the application (the parts that actually perform the white-box operations) are made more transparent than is customary for these parts. Flexible to adapt to the above mentioned automation system.

[0019] The benefits of such a system are similar to those gained by compiling code rather than writing hand-assembled code. In theory, a good programmer should be able to write applications in hand-assembled code. In practice, however, manual assembly code is extremely error-prone, and compilers make complexity never possible at the assembly code l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A development suite for generating files, such as DRM-protected files, using white-box cryptography. The suite consists of a code generation tool, a data transformation engine, and a white-box data generation tool, and a white-box library. In the white-box cryptography context, the data transformation engine is used to protect the boundary between the cryptographic operation and the surrounding code. In particular, the data transformation engine is used to apply data transformations to the inputs to and outputs from the cryptographic operations. If the user specifies that transformations are required via a white-box parameterization file, the code generation tool puts the information specified by the user into a form the data transformation engine understands, namely as qualifiers on data variables and function prototypes. The data transformation engine then applies the specified transformations, and passes information to the data generation tool regarding which transformations were chosen.

Description

technical field [0001] The present invention relates generally to cryptography. More specifically, the present invention relates to the development of software applications designed to operate securely in environments where an attacker has full access and control over the executing software. Background technique [0002] White-box cryptographic software is software that performs cryptographic functions in a white-box attack environment; that is, an environment in which at least part, and possibly the entire implementation, of a software application may be exposed to an attacker without The attacker has at least some degree of control, and possibly complete control, of the platform on which the software is running. [0003] For example, this environment occurs with cryptographic applications such as Digital Rights Management (DRM), where TV shows, movies, music, etc. are displayed on a personal computer (PC) or other similar everyday computing device, while Displayed on con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F21/00G06F9/45
CPCG06F8/51G06F21/14G06F21/57H04L9/002H04L2209/16G06F21/101
Inventor 菲利普·阿兰·艾森格兰特·斯图尔特·古德兹丹尼尔·阿列·默多克
Owner IRDETO ACCESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products