White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling

A non-linear encoding and perturbation scrambling technology, applied in the field of information security, can solve problems such as small amount of calculation and inability to extract keys

Inactive Publication Date: 2016-06-08
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The basic design idea of ​​white-box cipher is: for a given cryptographic algorithm and key information, the mapping from plaintext to ciphertext is determined; The execution process is completed by the lookup table method, the key is hidden in the table, but the attacker cannot extract the key from the lookup table
However, there is a common problem in the current white-box cipher schemes, that is, using the input and output characteristics of the lookup table, after eliminating the nonlinear part of the inner round scrambling code, only the linear scrambling operation is left in the outer code, so in The amount of calculation required to be broken under the white box condition is small, and the security of the password still needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling
  • White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling
  • White-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] A white-box cipher non-linear encoding protection method based on a combination of table lookup and disturbance scrambling, comprising the following steps:

[0027] 1) The 32-bit sensitive variable during the operation of the cryptographic algorithm is divided into four groups on average, each group is 8 bits, namely (x 0,0 ,x 0,1 ,x 0,2 ,x 0,3 ), and in turn through non-linear scrambling;

[0028] 2) Add disturbance information (β * ,Y,Φ * ), here we choose to add only one set of disturbance information as an illustration, and calculate β * =F(x 0,0 ,x 0,1 ,x 0,2 ,x 0,3 ) as an initial disturbance item, wherein F is a mapping from 32 bits to 8 bits;

[0029] 3) Pass the output of step 1) and step 2) sequentially through T 3 , T 2 , T 1 , T 0 ,Φ * transform;

[0030] 4) Modify the column confusion transformation (MixColumns) operation. The modified MixColumns operation still has the same effect on the original 4 input blocks, and the disturbing informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a white-box password nonlinear coding protection method based on combination of table look-up and disturbance scrambling. The white-box password nonlinear coding protection method comprises the following steps of: averagely dividing 32-bit sensitive variables in a password algorithm operation process into four sets, namely x<0,0>, x<0,1>, x<0,2> and x<0,3>, and sequentially performing nonlinear scrambling shown in the specification; adding disturbance information (beta*, Y, phi*), and calculating beta*=F(x<0,0>, x<0,1>, x<0,2> and x<0,3>) as an initial disturbance item; sequentially transforming results in two steps through T<3>, T<2>, T<1>, T<0> and phi*; taking an output result as column promiscuous transformation; and then, sequentially performing nonlinear displacement through Q<3>, Q<2>, Q<1>, Y and Q<0> to obtain an input variable for the next round of iteration, such that a final output result of a white box is obtained. According to the invention, nonlinear bijection transformation of internal and external coding is adopted simultaneously; because the algebraic time of a single S box is not beyond 8 and the algebraic time cannot be increased by a column promiscuous part and external radiation scrambling coding, required operation is relatively low; furthermore, when an external algebra interpolation attack occurs, a main key cannot be recovered directly; an equivalent decoding Boolean system is constructed; and thus, the safety of the white-box password nonlinear coding protection method disclosed by the invention is relatively high.

Description

technical field [0001] The invention relates to the field of information security, in particular to a white-box cipher non-linear encoding protection method based on a combination of table lookup and disturbance scrambling. Background technique [0002] In the design and implementation of traditional cryptographic algorithms and security protocols, it is generally assumed that the terminal in which the cryptographic algorithm operates is safe and credible, and the security of the entire system lies in the confidentiality of the key. With the continuous development of digital information technology, studies have found that cryptographic software usually runs in an unsafe environment, such as the presence of malicious viruses and dishonest users. It is easy to capture key information, a new security challenge is: how to hide the key information directly in the implementation of the algorithm in an open software code environment, and make it impossible for attackers to extract ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
Inventor 熊婉君韦永壮李灵琛丁勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products