443 Hits in 7.6 sec

Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation

Nilima Yadav, Sarvesh Tanwar
2013 International Journal of Computer Applications  
Chow proposed a new technique to secure cryptographic algorithms and key against white-box attacks, called white-box cryptography.  ...  Considerding these problems we have suggested a novel approch in e-banking system (credit card processing) using white box cryptography to encrypt the key and obfuscation which gives a strong encryption  ...  Black-box attack Gray Box Attack  Side Channel Analysis attacks (SCA) exploit information leaked from the physical implementation of a cryptographic system.  The leakage is passively observed via  ... 
doi:10.5120/11938-7728 fatcat:p3cwv4ammveh3kdxrqdsna4oma

Mobil Ödeme Sistemleri için Şifreleme Algoritmasının ve Modelinin Belirlenmesi

Öznur Şengel, Muhammed Ali Aydın, Ahmet Sertbaş
2020 Acta INFOLOGICA  
Acknowledgement: This work is a part of the Ph.D. thesis titled "Model Design and Performance Analysis for Secure Storage of Personal Data in Mobile Payment Systems" at Institute of Graduate Studies, Istanbul  ...  Conflict of Interest: The authors have no conflict of interest to declare. Grant Support: The authors declared that this study has received no financial support.  ...  There are three cryptography models; black box cryptography model, gray box cryptography model, and white box cryptography model.  ... 
doi:10.26650/acin.552116 fatcat:zzflqfnjgbe7pj2nsnnxxdxu7y

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations [article]

Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar
2021 arXiv   pre-print
As part of this analysis, we are the first to publicly disclose three RSA-based white-box schemes that are used in real-world products and present cryptanalytical attacks for all of them, finally resulting  ...  In this paper, we outline structural weaknesses in IEEE 1735 that cannot be fixed with cryptographic solutions (given the contemporary hardware design process) and thus render the standard inherently insecure  ...  “White-box cryptography and an AES Hardware and Embedded Systems (TCHES) 2 (2020), implementation”. In: 9th Annual International Confer- pp. 327–357.  ... 
arXiv:2112.04838v1 fatcat:kr5extcefvgrtdgarejgkcix5u

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [chapter]

Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2016 Lecture Notes in Computer Science  
In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort.  ...  Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products.  ...  This black-box may leak some meta-information: e.g., in terms of timing or power consumption. This side-channel analysis gave rise to the gray-box attack model.  ... 
doi:10.1007/978-3-662-53140-2_11 fatcat:vchh5a4ddnh2hfwvioakgehwz4

White-Box Cryptography and an AES Implementation [chapter]

Stanley Chow, Philip Eisen, Harold Johnson, Paul C. Van Oorschot
2003 Lecture Notes in Computer Science  
We partially justify our aes implementation, and motivate its design, by showing how removal of parts of the recommended implementation allows specified attacks, including one utilizing a pattern in the  ...  We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total access) attacks in untrusted execution environments.  ...  We thank Alexander Shokurov for suggesting the ambiguity metric of §4.2 in another context, and anonymous reviewers.  ... 
doi:10.1007/3-540-36492-7_17 fatcat:yih6rtt4y5ejfjz3ywvxhte6ga

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes [chapter]

Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016 Lecture Notes in Computer Science  
In this paper we present a new threat model for white-box cryptography which corresponds to the practical abilities of the adversary in a wide range of applications.  ...  Finally, we propose a class of new primitives that combine a white-box algorithm with a standard block cipher to obtain white-box protection for encrypting long messages, with high security and reasonable  ...  Conclusions In this paper we formulated a new threat model for white-box cryptography, which corresponds to the realistic abilities of the adversary in a wide range of applications, including lightweight  ... 
doi:10.1007/978-3-319-48965-0_55 fatcat:by6lfce5rndptfy4vvtt4zp5ui

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks

Louis Goubin, Matthieu Rivain, Junwei Wang
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Afterward, we propose a new paradigm for the gray-box attack against white-box cryptography, which exploits the data-dependency of the target implementation.  ...  The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment.  ...  Acknowledgements The authors would like to thank Wieland Fischer and the anonymous referees for their valuable comments. This work was partially supported by the French FUI AAP25 IDECYS+ project.  ... 
doi:10.13154/tches.v2020.i3.454-482 dblp:journals/tches/GoubinRW20 fatcat:pdmjsy2c6jb2xjz7uilipj7oam

SoK: Design Tools for Side-Channel-Aware Implementations [article]

Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021 arXiv   pre-print
Side-channel attacks that leak sensitive information through a computing device's interaction with its physical environment have proven to be a severe threat to devices' security, particularly when adversaries  ...  The demand to understand the scope, benefits, and limitations of the proposed tools intensifies with the increase in the number of proposals.  ...  ACKNOWLEDGMENTS This research was supported by The Australian Research Council Discovery Early Career Award DE200101577 and Discovery Project DP210102670, the Blavatnik ICRC at Tel-Aviv University, a gift  ... 
arXiv:2104.08593v2 fatcat:ybvrwhb4xbbdrftfgnmcklo5iu

Revisiting Software Protection [chapter]

Paul C. van Oorschot
2003 Lecture Notes in Computer Science  
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.  ...  We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.  ...  [17] (see also [18, 35] ) and white-box cryptography -cryptographic implementations designed to withstand attack in the white-box context.  ... 
doi:10.1007/10958513_1 fatcat:5hjupbqp5bgvxdrt2tlkeprr6i

RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System

Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha
2022 Symmetry  
In this paper, an image encryption scheme is proposed to help solve such a problem. The proposed scheme is implemented over three stages.  ...  The second stage utilizes a well-tested S-box, whose design involves a transformation, modular inverses, and permutation.  ...  Conflicts of Interest: The authors declare no conflict of interest. Symmetry 2022, 14, 443  ... 
doi:10.3390/sym14030443 fatcat:fitnmycm3nfxtcdudilgapvb5m

Security and Privacy of PUF-Based RFID Systems [chapter]

Ferucio Laurenţiu Ţiplea, Cristian Andriesei, Cristian Hristea
2020 Cryptography - Recent Advances and Future Developments [Working Title]  
Thus, it is emphasized the need to use formal models in the study of the security and privacy of (PUF-based) RFID schemes.  ...  In the end, we point out a significant benefit of using PUF technology in RFID, namely getting schemes that offer destructive privacy in Vaudenay's model.  ...  The black-box model does not depend on the software or hardware implementation, platform, and so on. In contrast to it, the gray-box model of attack exploits the algorithm/protocol implementation.  ... 
doi:10.5772/intechopen.94018 fatcat:kh55cwhx5zgr5kjilnpineevoy

Self-Spectre, Write-Execute and the Hidden State

Gregory Morse
2019 Tatra Mountains Mathematical Publications  
Either approaches could provide for strong white-box cryptography when considering a binary, non-source code form.  ...  Could the inherent design of the processor give the ability to hide arbitrary calculations in this speculative and parallel side channel?  ...  This model would certainly not be strong enough for white-box cryptography with well-known algorithms like AES-128.  ... 
doi:10.2478/tmmp-2019-0010 fatcat:6vn5gqg3vfe3rn4elym4tvntte

A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes

Ijaz Khalid, Sajjad Shaukat Jamal, Tariq Shah, Dawood Shah, Mohammad Mazyad Hazzazi
2021 IEEE Access  
In this manuscript, we propose an image encryption technique by using isomorphic elliptic curves which are proved to be effective against side-channel attacks and have efficient key size as compared to  ...  These points are then mapped to the isomorphic curve and are the reason for diffusion in the ciphertext.  ...  FIGURE 1: S-box construction A. Evaluation of S-boxes It is essential to evaluate the strength of proposed S-boxes to assess the overall strength of the proposed scheme.  ... 
doi:10.1109/access.2021.3083151 fatcat:6wqwihxsxncwfo4fouxue6qcu4

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies

Francesco Regazzoni, Stephane Badel, Thomas Eisenbarth, Johann Grobschadl, Axel Poschmann, Zeynep Toprak, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne
2007 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation  
Therefore, MCML is suitable to protect cryptographic hardware from DPA and similar side-channel attacks.  ...  Circuits implemented in MCML, in fact, have unique characteristics both in terms of power consumption and the dependency of the power profile from the input signal pattern.  ...  Some side-channel attacks are an extremely powerful and practical tool for breaking commercial implementations of cryptography.  ... 
doi:10.1109/icsamos.2007.4285753 dblp:conf/samos/RegazzoniBEGPDMPPLI07 fatcat:b57nlbjf45fhxixtwllvofptj4

Secure Extension of FPGA General Purpose Processors for Symmetric Key Cryptography with Partial Reconfiguration Capabilities

Lubos Gaspar, Viktor Fischer, Lilian Bossuet, Robert Fouquet
2012 ACM Transactions on Reconfigurable Technology and Systems  
In data security systems, general purpose processors (GPPs) are often extended by a cryptographic accelerator.  ...  The paper presents three ways of extending GPPs for symmetric key cryptography applications.  ...  Three buses are used: a data bus (in black), a key memory bus (in gray) and a cipher key bus (in white).  ... 
doi:10.1145/2362374.2362380 fatcat:256kv3eq5bcefclicoeudjxcxy
« Previous Showing results 1 — 15 out of 443 results