Symmetric white box encryption method with unfixed key and apparatus

A symmetric encryption and encryption method technology, applied in encryption devices with shift registers/memory, secure communication devices, usage of multiple keys/algorithms, etc. security concerns, etc.

Active Publication Date: 2017-02-15
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in this white-box encryption algorithm, the key is fixed, that is, the key is not transformed and directly combined with the nonlinear transformation of the algorithm to form a fixed part of the algorithm.
This white-box encryption algorithm with a fixed key cannot satisfy the user to set the key by himself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric white box encryption method with unfixed key and apparatus
  • Symmetric white box encryption method with unfixed key and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] A symmetric white-box encryption method and device with an unfixed key provided by the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0021] In the following description, various aspects of the present invention will be described. However, those skilled in the art can implement the present invention by using only some or all of the structures or processes of the present invention. For clarity of explanation, specific numbers, arrangements and sequences are set forth, but it will be apparent that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail in order not to obscure the invention.

[0022] According to one embodiment of the present invention, a symmetric white-box encryption method with an unfixed key is provided, including: Step 1: Use a symmetric encryption method to perform key expansion to obtain multip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a symmetric white box encryption method with an unfixed key. The method comprises the following steps: performing key expansion by using a symmetric encryption method to acquire multiple turns of encryption keys Kn; step 2, replacing the multiple turns of encryption keys Kn to acquire replaced keys Kn'; step 3, generating a white box library; step 4, transmitting the white box library and the replaced keys Kn' to a user; and step 5, performing white box encryption by a user on to-be-encrypted data by using the replaced keys Kn', and performing table lookup by using the white box library during the white box encryption to acquire ciphertext, wherein n represents the encryption turns of the symmetric encryption method. By adoption of the symmetric white box encryption method provided by the invention, the keys in the white box encryption are not only hidden, the white box library is separated from the keys, and users can set the keys by themselves, thereby being convenient and flexible.

Description

technical field [0001] The present invention relates to the field of computer security, and more specifically, the present invention relates to a symmetric white-box encryption method and device with an unfixed key. Background technique [0002] With the development of technologies such as wireless communication and the Internet, many devices can be connected to the Internet, including smartphones, tablets, cars, set-top boxes, wearable devices, smart home appliances (such as air purifiers), smart homes (smart cameras), etc. The networking of these devices has brought convenience to human life and production, and at the same time, it has given criminals an opportunity. Criminals can completely control and access hardware and software in some ways. The disassembly and static analysis of files, the control of the operating environment, combined with the use of control CPU breakpoints, observation registers, memory analysis, etc. to obtain passwords have a certain impact on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/0631H04L9/14H04L2209/16
Inventor 阚志刚彭建芬王全洲李世杰卢佐华陈彪
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products