Encryption algorithm white box method and device

An encryption algorithm and algorithm technology, applied in the computer field, can solve problems such as difficult code implementation, low efficiency, complex formula derivation, etc., to achieve the effect of simplifying technology, improving execution efficiency, and reducing occupied space.

Inactive Publication Date: 2019-01-22
JINGDONG TECH HLDG CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. Matrix multiplication is used, which is inefficient;
[0011] 2. The encryption lookup table and decryption lookup table take up a lot of space;
[0012] 3. The derivation of the formula is complicated, and it is not easy to implement the code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption algorithm white box method and device
  • Encryption algorithm white box method and device
  • Encryption algorithm white box method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0037] It should be noted that, in the case of no conflict, the embodiments of the present invention and the technical features in the embodiments can be combined with each other.

[0038] White-box encryption is an encryption form of a variable encryption process, which refers to a special encryption method that can resist attacks in a white-box environment. White-box enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for white-box encryption algorithm, which relates to the computer technical field. A specific embodiment of the method comprises the following steps: theoriginal key is combined with the original algorithm process and processed to obtain a transformation algorithm process; lookup table processing is carried out on the transformation algorithm processto obtain the transformation lookup table. The transformation lookup table is encrypted and decrypted to hide the original key. This embodiment improves the execution efficiency of encryption and decryption. The space occupied by the transformation lookup table is reducedand operation processing is simplified.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for white-boxing encryption algorithms. Background technique [0002] With the development of terminal technology, more and more software is installed on the terminal. However, the user terminal may be infected with malicious programs without knowing it, destroying the software operation logic or stealing the core content of the software, causing damage to the user. The traditional encryption algorithm is more to protect the network transmission process from being stolen. It assumes that the terminal is credible and the key is not known. However, when the terminal is untrustworthy, the key will be stolen by malicious behavior on the terminal and further used to unlock the important information of the user. Therefore, the use of traditional encryption algorithms cannot completely solve the risk of the important information of the user being stolen. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618H04L9/0631H04L2209/16
Inventor 李盛昌
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products