Security white box realizing method and device for national cipher standard algorithm SM4

A technology of cryptographic algorithm and implementation method, applied in the field of protection of cryptographic components in digital property rights system

Inactive Publication Date: 2016-06-15
INST OF INFORMATION ENG CAS
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has a negative impact on the application of SM4, a n...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security white box realizing method and device for national cipher standard algorithm SM4
  • Security white box realizing method and device for national cipher standard algorithm SM4
  • Security white box realizing method and device for national cipher standard algorithm SM4

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The specific embodiments and features of the present invention will be described in detail below, but the scope of the present invention is not limited in any way.

[0039] Such as figure 1 As shown, on the secure server side, there are three components: Lookup Table Generator (TG), Key Generator (KG), and Affine Transformation Generator (AG).

[0040] For each device (unsafe terminal), the AG of the server randomly generates 8 pairs of 32-bit reversible affine transformation A 32 , A 33 , A 34 , A 35 , B 0 , B 1 , B 2 , B 3 , and will B 0 ,B1 ,B 2 ,B 3 Bundled with the device's security feature modules (such as video player, music player, e-book reader, etc.). The device should also install the white box SM4 cryptographic algorithm module. The device is then ready for use by the user. Here, the 32-bit random reversible affine transformation can be generated according to device-related unique identifiers such as device MAC address and user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a security white box realizing method and device for the national cipher standard algorithm SM4, discloses essential components of equipment required by the white box SM4 algorithm, and belongs to the technical field of information security. With adoption of the method and the device, secret keys embedded into cipher software can be effectively protected in untrusted computer terminals. The white box SM4 password algorithm provided by the present invention achieves safe realization of the China commercial block cipher standard SM4. Secret keys are embedded into lookup tables, randomly selected affine codes are used for protecting the lookup tables, and thus the secret keys embedded in the lookup tables are protected. A TTC lookup table and a TRT lookup table are used in the algorithm, the last xor operation of output data of the TTC lookup table is embedded into the TRT lookup table, and output data of the TRT lookup table is protected by new 32-bit affine codes, so the situation of offsetting 32-bit affine codes embedded in the lookup tables by combining lookup tables can be prevented, thereby preventing reduction of code cracking difficulty, and realizing the protection aim.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to the protection of computing terminal cryptographic systems, in particular to the protection of cryptographic components in digital property right systems. It can be used to prevent malicious users from illegally obtaining the key of the cryptographic algorithm running in the computing terminal under their control, and prevent malicious users from illegally distributing the illegally obtained key and profiting from it. Background technique [0002] With the development of software, hardware, network and other technologies, more and more software is released to run on computing terminals such as personal computers, tablets, and mobile phones, and various applications emerge in an endless stream, such as e-mail, digital media players, and digital content readers etc. However, these applications often run on untrusted computing terminals. Malicious users can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0631
Inventor 白琨鹏武传坤
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products