On the Linear Transformation in White-Box Cryptography

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On White-Box Cryptography

White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions

متن کامل

White-Box Cryptography in the Gray Box

Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...

متن کامل

White Box Cryptography

This paper discusses white box cryptography, which is used to protect the key from white box attack. Previously white box cryptography was applied to symmetric key encryption, which does provide protection mechanism to the key, but affects the performance and is considered difficult to update the key. The scheme proposed by the researcher mentions White Box AES and improves its low performance ...

متن کامل

On White-box Cryptography and Obfuscation

We study the relationship between obfuscation and white-box cryptography. We capture the requirements of any white-box primitive using a White-Box Property (WBP) and give some negative/positive results. Loosely speaking, the WBP is defined for some scheme and a security notion (we call the pair a specification), and implies that w.r.t. the specification, an obfuscation does not leak any “useful...

متن کامل

White Box Cryptography: Another Attempt

At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a “traceable block cipher” by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implementation. Our technique is quite general, and we apply it – as a challenging example in the domain of white box cryptography – to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2980594