Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

White-box cryptograph non-linear encoding protection method based on table lookup

A non-linear coding and white-box cipher technology, which is applied in the field of non-linear coding protection of white-box ciphers based on look-up tables, can solve the problems of unable to extract the key and small amount of calculation, and achieve strong confidentiality and security, and computing small effect

Inactive Publication Date: 2016-05-18
GUILIN UNIV OF ELECTRONIC TECH
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The basic design idea of ​​white-box cipher is: for a given cryptographic algorithm and key information, the mapping from plaintext to ciphertext is determined; The execution process is completed by the lookup table method, the key is hidden in the table, but the attacker cannot extract the key from the lookup table
However, there is a common problem in the current white-box cipher schemes, that is, using the input and output characteristics of the lookup table, after eliminating the nonlinear part of the inner round scrambling code, only the linear scrambling operation is left in the outer code, so in The amount of calculation required to be broken under the white box condition is small, and the security of the password still needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box cryptograph non-linear encoding protection method based on table lookup
  • White-box cryptograph non-linear encoding protection method based on table lookup
  • White-box cryptograph non-linear encoding protection method based on table lookup

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] A non-linear encoding protection method of white-box cipher based on look-up table:

[0026] 1) Divide the m sensitive variables in the original cryptographic algorithm into n groups of 16 bits each, and pass through non-linear scrambling;

[0027] 2) the output of the Q transformation in step 1) is used as the input of the internal scrambling of the original cryptographic algorithm SP structure, wherein through T transformation and MixColumns transformation successively;

[0028] 3) Take all the outputs in step 2) and go through W 1 transform;

[0029] 4) The output of step 3) is taken as the final output of the current round of iterative process, and sent to the next round of iterative steps of the cryptographic algorithm until the end of the last round, thereby obtaining the ciphertext of the white-box cipher.

[0030] In step 1), the Q transform is an external nonlinear scrambling of 16-bit input and 16-bit output with good cryptographic properties constructed b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a white-box cryptograph non-linear encoding protection method based on table lookup. The white-box cryptograph non-linear encoding protection method comprises the steps of: dividing m variables of a cryptographic algorithm into n groups, wherein each group comprises 16 bits, and subjecting the groups to Q0<1>, Q1<1>, ... , Qn-1<1> nonlinear transformation in sequence; regarding output results as input of an internal obfuscation part of the cryptographic algorithm of an SP structure, taking an AES algorithm for an example, and carrying out T transformation and MixColumns transformation; subjecting obtained results to one-time m bit input and m bit output nonlinear W<1>transformation; and acquiring final results of this turn of iteration, and sending the final results to the subsequent turn of iteration step. According to the white-box cryptograph non-linear encoding protection method, internal and external codes are subjected to non-linear bijective conversion simultaneously, and required operation is small since the algebraic degree of a single S box is no more than 8 and cannot be increased by MixColumn components and external radiation obfuscation codes; in addition, a master cryptography key is not directly restored when facing external algebra interpolation attacks, but an equivalent decrypting Boolean system is constructed, thus the security of the white-box cryptograph non-linear encoding protection method is higher.

Description

technical field [0001] The invention relates to the field of information security, in particular to a table look-up-based non-linear coding protection method for white-box ciphers. Background technique [0002] In the design and implementation of traditional cryptographic algorithms and security protocols, it is generally assumed that the operating environment terminals of cryptographic algorithms are safe and credible, and the security of the entire system lies in the confidentiality of keys. However, with the continuous development of digital information technology, studies have found that cryptographic software usually runs in an unsafe environment, such as the presence of malicious viruses and dishonest users. In this environment, an attacker can easily capture key information by observing or executing cryptographic software. A new security challenge is: how to hide the key information directly in the implementation of the algorithm in an open software code environment,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/06
Inventor 熊婉君李灵琛韦永壮丁勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products