Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety operation method and system based on white box encryption

A safe operation, white box technology, applied in the field of network security, can solve the problems of small static data volume, high operation efficiency, and inability to achieve

Active Publication Date: 2017-04-26
TONGJI UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a safe operation method and system based on white-box encryption, which is used to solve the problem of having smaller static data volume and higher security in the prior art. Encryption and decryption issues for operational efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety operation method and system based on white box encryption
  • Safety operation method and system based on white box encryption
  • Safety operation method and system based on white box encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0052] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and number of componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety operation method and system based on white box encryption. The corresponding encryption algorithm and the decryption algorithm are matched by employing a series of static data as fixed input, lightweight safety operation can be realized, the volume of the static data is small, the operation efficiency is high, and relatively high encryption security can be obtained in a white box attack environment with limited calculating resources.

Description

technical field [0001] The invention relates to the field of network security, in particular to a safe operation method and system based on white-box encryption. Background technique [0002] With the development of technologies such as the Internet of Things and mobile computing, there are more and more scenarios where programs may run in unsafe environments, such as smart phones and tablets picked up or stolen by attackers, captured sensor network nodes, etc. in an unsafe operating environment. The security of cryptographic algorithms and protocols is crucial to ensuring the overall security of information systems. The attack models of traditional cryptographic systems, such as chosen plaintext attack and chosen ciphertext attack, are based on a common assumption that cryptographic algorithms run on secure terminals. Side channel attacks allow attackers to obtain certain leaked information, but are still constrained by a given leak function. In the aforementioned insecu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 史扬韦吾境范鸿飞
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products