Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

White-box password operation method and system

A white-box cryptography and computing method technology, applied in the field of information security, can solve the problems of unable to make key changes and key fixation at any time, and achieve the effect of rapid update, improved applicability, and improved security.

Inactive Publication Date: 2018-03-16
山东三未信安信息科技有限公司
View PDF10 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, Chow et al. proposed a white-box encryption algorithm in 2002. The key does not appear in the cryptographic operation in the form of plain text, but the key is fused into the lookup table for calculation, although the security of information is improved to a certain extent. , but the key formed by this calculation method is fixed and cannot be changed at any time, which limits the promotion and use of white-box keys in terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box password operation method and system
  • White-box password operation method and system
  • White-box password operation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0083] Such as figure 1 As shown, it is a schematic flow chart of a white-box cryptographic operation method provided by an embodiment of the present invention, the method comprising:

[0084] S1, the server generates multiple white-box lookup tables, and sends all the white-box lookup tables to a preset terminal for storage.

[0085] It can be understood that multiple white-box lookup tables can be generated and sent to multiple preset terminals for storage, so that cryptographic operations can be performed with multiple preset terminals at the same time. The server generates multiple white-box lookup tables according to a key corresponding to a preset terminal, and sends all white-box lookup tables generated by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a white-box password operation method and system. The method comprises the following steps of generating a plurality of white-box lookup tables, and sending all white-box lookup tables to a preset terminal for storage; acquiring first information sent by the preset terminal and encrypted according to all white-box lookup tables, and a unique identification code of the preset terminal; obtaining a secret key according to the unique identification code and a pre-stored mapping relation; and decrypting the encrypted first information according to the secret key. Accordingto the white-box password operation method and system, which are provided by the invention, rapid updating of a white-box password in the terminal equipment can be effectively realized, the secret key in the terminal equipment does not maintain the unique secret key after delivery, and the safety is further improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a white-box cryptographic calculation method and system. Background technique [0002] With the rapid rise of the Internet of Things technology, devices such as smart homes can be connected to the Internet, which greatly improves the convenience of people's lives. However, in view of the complexity of the key interaction of Internet of Things terminal devices, it is generally chosen to store passwords in advance, which will bring Here comes a huge security risk. In the terminal device controlled by the attacker, the key used in the encryption operation can be obtained by the attacker through various methods and tools, and the attacker can freely observe the execution of dynamic code, and even change the details of the internal algorithm. [0003] Based on this, Chow et al. proposed a white-box encryption algorithm in 2002. The key does not appear in the cryptographic operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0866H04L9/0891H04L63/0428H04L63/068H04L63/0846H04L63/0876
Inventor 刘会议杨国强党美
Owner 山东三未信安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products