White-box cryptography hiding keys in software




















Code obfuscation refers to the process of transforming code in such a way that it becomes highly difficult to analyze. On the contrary, white-box cryptography employs various data transformation methods aimed particularly at safeguarding the implementation of cryptographic algorithm software.

As a result, secret cryptographic keys are always safe and concealed. In most cases, Whitebox cryptography is deployed to protect cryptographic implementations in different apps executed on open devices, such as smartphones, PCs and tablets, when the developer is required to achieve the highest level of security without any dependency on secure hardware elements.

Several software applications store and handle private and sensitive data and can benefit immensely from white-box cryptography. In some of the sectors, it is, in fact, a crucial component of their security policy. Some of the examples of particular applications are discussed below-.

Various mobile payment apps today are using near field communication NFC technology to transform commercially available phones into contactless payment terminals. These can be instrumental for enterprises, especially those with limited resources, to invest in specialist point-of-sale systems.

However, one of the primary issues here remains security. The best part is that this is regardless of the device they run. Most of the medical device data is encrypted and sent using a compact cipher. Apart from this, this medical data may be signed to guarantee its integrity.

Typically, a key is secure inside the boundaries of a medical device and on cloud servers both. The apps or programs functioning on the smartphone or desktop PC are the weakest link in terms of security.

The rapid rise of OTT or over-the-top video services has given rise to the issue for those responsible for protecting video material from hackers while also ensuring ease of access and a streamlined watching experience for paying customers. White-box cryptography resolves this issue and applies to both apps and set-top boxes used by OTT service providers to deliver content.

A fully-featured white-box cryptography suite that can be instrumental for adding protection to mobile, desktop as well as server apps. Encrypting all the sensitive information throughout its lifecycle and in the app is the key to keeping the data secure. While significant effort has been put to secure data in transit, the weak link here remains the app.

White-box cryptography offers a great solution to create protection against various kinds of app vulnerabilities. There is still a lot of room for improvement but, for now, it has shown great potential in safeguarding various applications against hackers. White-box cryptography aims to achieve an absolute level of security for apps. As of now, the technique has proven quite capable of safeguarding your apps and protecting confidential and other precious data from any malicious attacks.

One-stop Billing on AWS. This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website.

Keeping secret keys secret in open systems. Highly Influenced. View 4 excerpts, cites methods and background. With the invention of high speed internet and content digitization, large scale content sharing has become exceptionally easy. This ease adds fuel to the fire of piracy, which causes a gigantic loss … Expand.

View 1 excerpt. View 1 excerpt, cites background. A selective encryption algorithm of video based on white-box AES. Engineering, Computer Science. International Conference on Digital Image Processing. Cryptography is used to prevent people accessing data they are not authorized to access. However in some case the algorithm used for encrypting data are performed on an untrusted device for example … Expand. View 2 excerpts, cites background. A representation where the operations on the secret key are combined with random data and code, in such a way that the random data cannot be distinguished from key information.

The figure below depicts a conceptual high-level overview of WBC, for the case of a fixed key implementation. In such an implementation, the key will be hard-coded into the code. On the left hand side is the description of a cryptographic cipher and the key. White-box transformations will then generate the code for an application that is semantically the same, but for which it is hard to extract the key that is embedded into the code.



0コメント

  • 1000 / 1000