White-box cryptography system for confusing wheel boundary and method

A technology of white-box cipher and wheel boundary, applied in the information field, can solve the problem of difficult concealment of linear diffusion operation, and achieve the effect of increasing difficulty

Inactive Publication Date: 2015-11-25
INST OF INFORMATION ENG CAS
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] at 15 th "Cryptanalysis of Generic Class of White-Box Implementations" (hereinafter referred to as "Michiels1") by W.Michiels, P.Gorissen and H.D.L.Hollmann in Annual Workshop on Selected Areas inCryptography (SAC2008, Sackville, New Brunswick, Canada, 2008) points out Chow's white box for creating cryptographic algorithms A weakness of the implemented method is that the linear diffusion operation in each round in the white-box implementation is difficult to hide with nonlinear encoding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box cryptography system for confusing wheel boundary and method
  • White-box cryptography system for confusing wheel boundary and method
  • White-box cryptography system for confusing wheel boundary and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific implementation of the present invention will be described below by taking the block cipher AES128 (hereinafter referred to as AES) as an example. Of course, the present invention can also be applied to white-box implementations of other block ciphers, and even more generally to all white-box cryptosystems that need to obfuscate round boundaries.

[0033] The summary process is as follows: First, we follow the "Chow1" method, use the lookup table to realize the basic operation of each round of AES, and hide the key in the lookup table. In order to achieve the purpose of confusing the round boundary in the next step, we will "Chow1" The lookup table is improved, and the row shift operation is also implemented in the lookup table; after implementing AES with a lookup table, we can divide these lookup tables into lookup table groups with similar structures, and randomly increase the number of mixed bijections (equivalent to randomly adding sets of obfuscated lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a white-box cryptography system for executing block cipher algorithms such as an AES (Advanced Encryption Standard), in particular to a method for enhancing the white-box cryptography security. The method comprises the following steps: under the situation of a given key, finishing encryption or decryption by a network of a plurality of lookup tables executing crypto-operation together, wherein the lookup table network can be partitioned into a plurality of lookup table groups which are executed in series and similar in structures, certain lookup table groups are relevant to the key while certain lookup table groups are irrelevant to the key, and the total quantity of the lookup table groups is random; and adding a random quantity of confused lookup table groups to increase the difficulty for an attacker to determine each wheel boundary in white-box implementation. In the presence of the lookup table network, the difficulty for the attacker to determine the wheel boundary of an original block cipher is high, so that a method for making attacks with the input and output of a single wheel becomes difficult.

Description

technical field [0001] The invention belongs to the field of information technology, and relates to a white-box cryptosystem for encrypting or decrypting by using a plurality of look-up table networks jointly performing cryptographic operations under the condition of a given key. The invention also relates to a method of increasing the security of white-box cryptography. Background technique [0002] With the development of information technology, more and more consumer electronics (CE) are designed to directly access the Internet (or access the Internet indirectly through the PC platform as a proxy), so as to obtain digital content distributed through the Internet anytime and anywhere. These CE products include but are not limited to digital set-top boxes, IPTVs, PCs, and increasingly handheld devices such as mobile phones and tablet computers. Software applications installed in these CE products can perform operations such as parsing and playing digital content. Due to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 武传坤许涛
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products