Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software tampering detection method based on white box CLEFIA encryption method

An encryption method and tamper detection technology, applied to electrical components and key distribution, can solve the problem of small size of detection software

Active Publication Date: 2021-07-13
XIDIAN UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the deficiencies in the above-mentioned prior art, and propose a software tampering detection method based on the white box CLEFIA encryption method, which is used to solve the technical problem that the size of the detection software existing in the prior art is small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software tampering detection method based on white box CLEFIA encryption method
  • Software tampering detection method based on white box CLEFIA encryption method
  • Software tampering detection method based on white box CLEFIA encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0045] Step 1) Set the black box CLEFIA encryption method parameters:

[0046] Let the whitening key of the black-box CLEFIA encryption method be WK 1 、WK 2 、WK 3 and WK 4 , the CLEFIA encryption method includes N rounds of iterations, and the round function of the nth round of iterations is with WK 1 and WK 2 Before the first round of iteration, WK 3 and WK 4 After the last round of iterations, where N=18, with Respectively with input, and with The size of the finite field GF(2) 32 A randomly generated 32-bit vector on the with Respectively with The round key, WK 1 、WK 2 、WK 3 and WK 4 ,as well as with are 32 bits in size, with The expressions are respectively:

[0047]

[0048]

[0049]

[0050]

[0051] Among them, M 0 and M 1 respectively represent the 32×32 diffusion matrix defined ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software tampering detection method based on a white-box CLEFIA encryption method, which is used for solving the problem of small size of detection software in the prior art, and comprises the following implementation steps: setting parameters of a black-box CLEFIA encryption method; constructing an affine transformation function; constructing a lookup table (ELUT) of a round function in the white-box CLEFIA encryption method; constructing a lookup table (CLUT) of a binary code file of the to-be-detected software; constructing an auxiliary operation lookup table WLUT; updating the white box CLEFIA encryption method; and judging whether the to-be-detected software is tampered or not.

Description

technical field [0001] The invention belongs to the technical field of software protection, and relates to a method for detecting software tampering, in particular to a method for detecting software tampering based on a white-box CLEFIA encryption method. Background technique [0002] Thanks to the rapid development of computer technology, the demand for software has been further improved. Therefore, R&D personnel have developed software that can provide various services for users to use. Through the application of these software, the daily life of users has become more convenient. However, While these softwares provide convenience to users, they also bring some potential risks to users' personal privacy. In recent years, software security issues are common. Among them, software tampering "stands out" among many security issues due to the seriousness of its consequences, and has attracted extensive attention from researchers. Software tampering means that malicious attacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/60G06F21/64H04L9/08
CPCG06F21/12G06F21/602G06F21/64H04L9/0891G06F2221/033
Inventor 陈杰姚思罗一诺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products